SlideShare a Scribd company logo
1 of 1
Download to read offline
DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING
ATTACKERS IN WIRELESS NETWORKS
ABSTRACT:
In this paper, we propose to use spatial information, a physical property associated with each
node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing
attacks; 2) determining the number of attackers when multiple adversaries masquerading as the
same node identity; and 3) localizing multiple adversaries.
We propose to use the spatial correlation of received signal strength (RSS) inherited from
wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the
number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed
to determine the number of attackers.
We explore using the Support Vector Machines (SVM) method to further improve the accuracy
of determining the number of attackers. In addition, we developed an integrated detection and
localization system that can localize the positions of multiple attackers. We evaluated our
techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee)
network in two real office buildings.
Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate
and Precision when determining the number of attackers. Our localization results using a
representative set of algorithms provide strong evidence of high accuracy of localizing multiple
adversaries.
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

More Related Content

What's hot

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Identifying attack propagation patterns in Honeypots using Markov Chains Mode...
Identifying attack propagation patterns in Honeypots using Markov Chains Mode...Identifying attack propagation patterns in Honeypots using Markov Chains Mode...
Identifying attack propagation patterns in Honeypots using Markov Chains Mode...
Preeti M Sobarad
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
Anjan Mondal
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
rahulmonikasharma
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
IOSR Journals
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1
Selva Raj
 
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORKBLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK
AM Publications
 

What's hot (16)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Identifying attack propagation patterns in Honeypots using Markov Chains Mode...
Identifying attack propagation patterns in Honeypots using Markov Chains Mode...Identifying attack propagation patterns in Honeypots using Markov Chains Mode...
Identifying attack propagation patterns in Honeypots using Markov Chains Mode...
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhan
 
A1803060110
A1803060110A1803060110
A1803060110
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
O010528791
O010528791O010528791
O010528791
 
Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanism
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORKBLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK
BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK
 

Viewers also liked (11)

Mapa conceptual danny reyes
Mapa conceptual danny reyesMapa conceptual danny reyes
Mapa conceptual danny reyes
 
Dotnet a data fusion technique for wireless ranging performance improvement
Dotnet  a data fusion technique for wireless ranging performance improvementDotnet  a data fusion technique for wireless ranging performance improvement
Dotnet a data fusion technique for wireless ranging performance improvement
 
Dotnet distance bounding a practical security solution for real-time locatio...
Dotnet  distance bounding a practical security solution for real-time locatio...Dotnet  distance bounding a practical security solution for real-time locatio...
Dotnet distance bounding a practical security solution for real-time locatio...
 
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...Dotnet  delay-optimal broadcast for multihop wireless networks using self-int...
Dotnet delay-optimal broadcast for multihop wireless networks using self-int...
 
Introducción a la traducción
Introducción a la traducciónIntroducción a la traducción
Introducción a la traducción
 
Dotnet an access point-based fec mechanism for video transmission over wirel...
Dotnet  an access point-based fec mechanism for video transmission over wirel...Dotnet  an access point-based fec mechanism for video transmission over wirel...
Dotnet an access point-based fec mechanism for video transmission over wirel...
 
Magazine Ideas
Magazine IdeasMagazine Ideas
Magazine Ideas
 
Dotnet a survey of xml tree patterns
Dotnet  a survey of xml tree patternsDotnet  a survey of xml tree patterns
Dotnet a survey of xml tree patterns
 
Land art
Land artLand art
Land art
 
Taal op koers! Social media in het mbo
Taal op koers! Social media in het mboTaal op koers! Social media in het mbo
Taal op koers! Social media in het mbo
 
Evaluation question 3
Evaluation question 3Evaluation question 3
Evaluation question 3
 

Similar to Dotnet detection and localization of multiple spoofing attackers in wireless networks

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Kumar Goud
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
Ecwayt
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
Ecwayt
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
Ecwaytech
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
ecwayprojects
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
Ecwayt
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
prjpublications
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 

Similar to Dotnet detection and localization of multiple spoofing attackers in wireless networks (20)

Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
I1802046780
I1802046780I1802046780
I1802046780
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
 
50120140506007 2
50120140506007 250120140506007 2
50120140506007 2
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant Extraction
 

Dotnet detection and localization of multiple spoofing attackers in wireless networks

  • 1. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS IN WIRELESS NETWORKS ABSTRACT: In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. We explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com