preventionofmultiplewirelessspoofingattackprotocols

B.VIDHYA,

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:2         Issue:3         Year: 08 April,2014         Pages:104-110

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

Wireless networks are vulnerable to spoofing attacks which allows for many other forms of attacks on the networks. The identity of node can be verified through cryptography authentication scheme, this authentication scheme is not always desirable because it requires key management and additional infrastructure overhead. In this paper, I proposed to use spatial information, physical property associated with each wireless node that is hard to falsify not based on cryptography authentication scheme, as basis for detecting spoofing attacks, determining the number of spoofing attackers when multiple attackers use same node identity and localizing multiple attackers. I proposed to use spatial correlation received signal strength (RSS), inherited from multiple wireless node to detect the spoofing attack. Then I proposed to use generalized attack detection model (GADE) to detect and determine the number of attackers. In addition, I developed integrated detection and localization system that can localize the multiple spoofing attackers.

Kewords

Wireless network security, spoofing attack, attack detection, localization

Reference

[1] J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,”Proc. USENIX Security Symp., pp. 15-28, 2003. [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004. [3] D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006. [4] Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006. [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks,” Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005. [6] A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005. [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008. [8] J. Yang, Y. Chen, and W. Trappe, “Detecting Spoofing Attacks in Mobile Wireless Environments,” Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), 2009. [9] Y. Chen, W. Trappe, and R.P. Martin, “Detecting and LocalizingWireless Spoofing Attacks,” Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), May 2007. [10] M. Bohge and W. Trappe, “An Authentication Framework for Hierarchical Ad Hoc Sensor Networks,” Proc. ACM Workshop Wireless Security (WiSe), pp. 79-87, 2003. [11] L. Xiao, L.J. Greenstein, N.B. Mandayam, and W. Trappe, “Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 4646-4651, June 2007. [12] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless Device Identification with Radiometric Signatures,” Proc. 14th ACM Int’l Conf. Mobile Computing and Networking, pp. 116-127, 2008. [13] F. Guo and T. Chiueh, “Sequence Number-Based MAC Address Spoof Detection,” Proc. Eighth Int’l Conf. Recent Advances in Intrusion Detection, pp. 309-329, 2006. [14] L. Sang and A. Arora, “Spatial Signatures for Lightweight Security in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 2137- 2145, 2008. [15] P. Bahl and V.N. Padmanabhan, “RADAR: An in-Building RFBased User Location and Tracking System,” Proc. IEEE INFOCOM, 2000. [16] E. Elnahrawy, X. Li, and R.P. Martin, “The Limits of Localization Using Signal Strength: A Comparative Study,” Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Oct. 2004. [17] Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, “A Practical Approach to Landmark Deployment for Indoor Localization,” Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Sept. 2006. [18] J. Yang and Y. Chen, “A Theoretical Analysis of Wireless Localization Using RF-Based Fingerprint Matching,” Proc. Fourth Int’l Workshop System Management Techniques, Processes, and Services (SMTPS), Apr. 2008. [19] P. Enge and P. Misra, Global Positioning System: Signals, Measurements and Performance. Ganga- Jamuna Press, 2001. [20] Z .Yang, E. Ekici, and D. Xuan, “A Localization-Based Anti-Sensor Network System,” Proc. IEEE INFOCOM, pp. 2396-2400, 2007. [21] T. He, C. Huang, B. Blum, J.A. Stankovic, and T. Abdelzaher, “Range-Free Localization Schemes in Large Scale Sensor Networks,” Proc. MobiCom ’03, 2003. [22] Y. Chen, W. Trappe, and R. Martin, “Attack Detection in Wireless Localization,” Proc. IEEE INFOCOM, Apr. 2007. [23] A. Goldsmith, Wireless Communications: Principles and Practice. Cambridge Univ. Press, 2005. [24] T. Sarkar, Z. Ji, K. Kim, A. Medouri, and M. Salazar-Palma, “A Survey of Various Propagation Models for Mobile Communication,”IEEE Antennas and Propagation Magazine, vol. 45, no. 3, pp. 51- 82, June 2003. [25] M. Abramowitz and I.A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. Courier Dover, 1965