secure data forwarding and preventing from spoofing attacks

K.Ravikumar,GV KAYAL VIZHI

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:1         Year: 26 June,2014         Pages:316-320

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Spatial information, a physical property associated with each node, hard to falsify, and not a few cryptography, as the foundation for 1) discovering spoofing attacks; 2) identifying the variety of assailants when several opponents disguised as the same node identity; and 3) localizing several opponents. It suggests to use the spatial connection of obtained indication durability (RSS) got from wi-fi nodes to recognize the spoofing strikes. Then come up with the issue of identifying the variety of assailants as a multiclass recognition issue. Cluster-based systems are designed to figure out the variety of assailants. When the training data are available, discover using the Support Vector Devices (SVM) method to further improve the precision of identifying the variety of assailants. Sybil Defensive player can successfully recognize the Sybil nodes and recognize the Sybil group around a Sybil node, even when the variety of Sybil nodes presented by each strike advantage is close to the hypothetically noticeable lower limited. Besides, we recommend two techniques to restricting the variety of strike sides in on the internet public networking sites. The study results of our Face book application show that the supposition made by past work that all the connections in public networking sites are reliable does not apply to on the internet public networking sites, and it is possible to restrict the variety of strike sides in on the internet public networking sites by connection ranking.

Kewords

Sybil Attack, Social Network, Random Walk

Reference

[1] J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. USENIX Security Symp., pp. 15-28, 2003. [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004. [3] D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006. [4] Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006. [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks,” Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005. [6] A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005. [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008. [8] J. Yang, Y. Chen, and W. Trappe, “Detecting Spoofing Attacks in Mobile Wireless Environments,” Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), 2009. [9] Y. Chen, W. Trappe, and R.P. Martin, “Detecting and Localizing Wireless Spoofing Attacks,” Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), May 2007. [10] M. Bohge and W. Trappe, “An Authentication Framework forHierarchical Ad Hoc Sensor Networks,” Proc. ACM Workshop Wireless Security (WiSe), pp. 79-87, 2003.