SlideShare a Scribd company logo
1 of 6
Download to read offline
The International Journal Of Engineering And Science (IJES)
||Volume|| 3 ||Issue|| 01 || Pages || 01-06 || 2014||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805

Modeling Security with Localization of Multiple Spoofing
Attackers in Wireless Network
1,

Archana Shelar, 2, Guide: M.D.Ingale
1,

(M.E (Computer) student, Pune University)
2,
(Asst.Prof, Pune University)

------------------------------------------------------ABSTRACT---------------------------------------------------As the current age is the age of computers, the wireless spoofing attacks that can be easily launched and these
attacks also degrade the performance of the system or networks. The cryptography can be used to maintain
security in such networks but such conventional approach can’t be desirable due to its overhead requirements.
Hence in this paper we propose to use RSS (Received Signal Strength) i.e. the spatial information which is the
physical property of each node. This physical property is not reliant on any cryptographic scheme and also it is
hard to falsify n hence essential to use. This paper mainly focuses on-A.To Detect spoofing attacks in the
network B. Determines the number of attackers C. Localizing multiple attackers.
The spoofing attacks can be detected using RSS (Received Signal Strength) and Medoids levels which
can be inherited from wireless nodes in the network. Also we then use the multiclass detection problem to find
number of spoofing attackers. Further the IDOL model is used to localize positions of actual attackers. Our
experimental results show that the techniques used in this paper provide high level of security with topmost hit
rate and precision, also it gives the accuracy in localizing multiple adversaries.

Keywords: - Spoofing attack, Attack detection, Localizing attack, Wireless network security.
--------------------------------------------------------------------------------------------------------------------------- -----------Date of Submission: 20 December 2013
Date of Acceptance: 08 January 2014
----------------------------------------------------------------------------------------------------------------------------- ----------

I.

INTRODUCTION.

As computing and performing networks are shifting from wired intrastructure to the wireless, mobile
and open communication networks, for increasing the speed of computation. But such networks are easily
susceptible for multiple and variety of adversary attacks like spoofing attacks [1][2][3][4]. Basically the identity
based spoofing attacks or masquerading attacks are easy to launch and also it can cause significant damage to
the network performance. Spoofing attacks also facilitate various types of traffic injection attacks, such as
attacks on access control Lists (ACL), rogue access point (AP) attacks, and eventually Denial of- Service (DoS)
attacks. The cryptographic techniques can be used to address such type of security violations.
However, the application of cryptographic schemes requires reliable key distribution, management, and
maintenance mechanisms. It is not always desirable to apply these cryptographic methods because of its
infrastructural, computational, and management overhead. Further, these cryptographic methods are also
susceptible to node compromise, which is a serious concern as most wireless nodes are easily accessible,
allowing their memory to be easily scanned. In this paper work we propose to use received signal strength
(RSS)-based spatial correlation. It can be used mainly for- A. Detect the presence of spoofing attacks
B.Determine the number of attackers C. Localize multiple adversaries and eliminate them.
RSS it’s a physical property associated with each node. It is also hard to falsify and not reliant on
cryptography. As here we are concerned with attackers with different locations than legitimate wireless nodes,
utilizing such spatial information to address spoofing attacks has the unique power to not only identify the
presence of these attacks but also localize adversaries. The enhanced advantage of this RSS based spatial corelation is that--it will not require any additional cost or modification to the wireless devices themselves.
Previously the Sheng et al. used RSS and K-means cluster analysis to detect spoofing attacks.
However, none of these approaches have the ability to determine the number of attackers when multiple
adversaries use the same identity to launch attacks, which is the basis to further localize multiple adversaries
after attack detection. The main focus of our work is—

www.theijes.com

The IJES

Page 1
Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network.
1. A generalized attack detection model (GADE): It can detect the spoofing attack in the network as
well as can determine the number of spoofing attackers in the same system. Here the attack detection can be
performed using Partitioning around Medoids (PAM) which calculates the medoid distance. If the medoid
distance value is small it means that spoofing attack is not detected but if it is large then it signifies that spoofing
attack is detected. Then we used cluster based Multiclass detection problem to determine number of spoofing
attackers. Also further we developed and used the SILENCE mechanism to improve the accuracy of finding
number of attackers.
2. Integrated detection and localization system (IDOL):-IDOL can detect the attacks and also can
accurately localize the positions of spoofing adversaries or attackers. Here IDOL model uses the results returned
by GADE model. One key observation is that IDOL can handle attackers using different transmission power
levels, and hence provides strong evidence of the effectiveness of localizing adversaries when there are multiple
attackers in the network.
The rest of the paper is organized as follows.
We provide the Existing Approach in Section 2.We provide Proposed system with model in section 3.We
describe cluster based Multiclass Detection Problem in section 4.Then we provide advanced IDOL model in
section 5.

II.

EXISTING TRADITIONAL APPROACH.

Cryptography is the traditional approach to prevent and detect spoofing attack. It needs secure key
management and respective framework. The Public Key Interface (PKI) can be used further to reduce the
overhead of key management [5][6]. Also to avoid key compromisation, wool implemented key management
mechanism with periodic key refresh and host revocation.
However such cryptographic authentication may not be always applicable because of the limited
resources on wireless devices and lacking of a fixed key management infrastructure in the wireless network.
For ex. The Wired Equivalent Privacy protocol is used in 802.11 networks to protect link-level data during
wireless transmission. It depicts Following properties:WEP relies on a secret key shared between the communicating parties to protect the body of a
transmitted frame of data. Encryption of a frame proceeds as follows:
Encryption: In the second stage, we encrypt the plaintext derived above using RC4. We choose an initialization
vector (IV). The RC4 algorithm generates a keystream i.e., a long sequence of pseudorandom bytes—as a
function of the IV and the key. This Then, we use exclusive-or (XOR, denoted by) the plaintext with the key
stream to obtain the ciphertext.
Transmission:
Finally, we transmit the IV and the ciphertext over the radio link.
Recently the current approaches use physical properties like RSS (Received Signal Strength) associated
with wireless nodes so as to address spoofing attacks in the wireless network. The channel-based authentication
scheme was proposed to discriminate between transmitters at different locations, and thus used to detect
spoofing attacks in wireless networks [8].Li and Trappe [4] introduced a security layer that used forge-resistant
relationships based on the packet traffic, including MAC sequence number and traffic pattern, to detect spoofing
attacks. The MAC sequence number has also been used in [9] to perform spoofing detection. Both the sequence
number and the traffic pattern can be manipulated by an adversary as long as the adversary learns the traffic
pattern under normal conditions. The basic RSS work was also proposed in [3], [7], [10]. However, none of
these approaches are capable of determining the number of attackers when there are multiple adversaries
collaborating to use the same identity to launch malicious attacks. Also they do not have the ability to localize
the positions of the adversaries after attack detection. Here is the main point that our work uses the spatial
information to detect the attacks instead of any cryptographic scheme, and hence it differs from the previous
techniques. Additionally our approach is innovative and more creative as it helps find number of spoofing
attackers and also gives the accuracy in localizing such multiple adversaries masquerading with the same
identity.

www.theijes.com

The IJES

Page 2
Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network.

III.

PROPOSED SYSTEM.

GADE
IDOL
Fig.1 gives the overall pictorial presentation of this new security technique.

Fig 1.Overall working view of the system
1.GADE(Generalised attack Detection Model):- Here we used to porpose RSS,a physical proprety
closely co-related with location in physical space and also it is readily available in the existing wireless
networks. As RSS can be affected due to random noise, environmental bias, and multipath effects then also the
RSS measured at a set of landmarks is closely related to the transmitter’s physical location [11].According to
this the RSS readings present strong spatial correlation characteristics.
The RSS vector is defined with value vector as- S= {s1, s2, s3… sn} where n is the number of
landmarks/access points that are monitoring the RSS of the wireless nodes and know their locations.
In case of spoofing attack, the two main elements are


Victim
Attacker

Here both can transmit data packets by using same ID and the RSS readings of that ID is the mixture of
readings measured from each individual node (i.e., spoofing node or victim node). Since under a spoofing
attack, the RSS readings from the victim node and the spoofing attackers are mixed together, this observation
suggests that we may conduct cluster analysis on top of RSS-based spatial correlation to find out the distance in
signal space and further detect the presence of spoofing attackers in physical space. In this paper work, we
propose to use Partitioning around Medoids (PAM) Method so as to perform clustering analysis in RSS. The
PAM Method is a popular iterative descent clustering algorithm [12]. Also the evaluation results showed that
PAM method is more robust than popular K-means clustering algorithm [13].Particularly our objective in this
method is to detect the presence of attacks. Here null hypothesis indicates that no spoofing attack. T is the Test
spec i.e. (Test specification) it is used to indicate wether observed data belongs to the null hypothesis or not. We
then consider the distance between two medoids as Dm.
Dm=║Mi-Mj║
Where Mi and Mj are the medoids of two clusters. Under normal condition (i.e. when there is no spoofing
attack) it is treated that basically there should be only one cluster from a single physical location. In such normal
case Dm should be small. However, under a spoofing attack, there is more than one node at different physical
locations claiming the same node identity. As a result, more than one cluster will be formed in the signal space
and hence Dm will be large as the medoids are derived from the different RSS clusters associated with different
locations in physical space. Finally this model suggests that if the value of D m distance is small then it means
that there is no spoofing attack present in the system. But if Dm distance is large then it means that spoofing
attack is detected.

www.theijes.com

The IJES

Page 3
Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network.

IV.

MULTICLASS DETECTION PROBLEM.

Multiclass detection problem includes determining number of attackers and similar in determining how
many clusters existing in the RSS readings.
Pi=Ci
Ni= Ụ cj € C
Here C is the set of all classes.ci is the specific number of attackers under particular class.Ni is the all other class
as negative class. The related precision and F-measure are in[14].This gives the number of attackers in the
system.
4.1 SILENCE Mechanism.

Fig.2.Cluster Representation view
This SILENCE mechanism’s basic Silhouette Plot for cluster is in [17][18].Based on this observation
we developed SILENCE,SILhouette Plot and System EvolutioN with minimum distanCE of cluster. This
evaluates the minimum distance between clusters so as to improve the accuracy of determining the number of
Attackers. SILENCE gives the K as number of attackers in the system. This K also depends on Dm-that’s the
distance between medoids.
4.2 Support Vector Machine (SVM) based mechanism.
SVM is a set of kernel-based learning Methods for data classification that involves a training phase and
a testing phase [19]. Here each data instance in the training set consists of a target value (i.e., class label) and
several attributes (i.e., features).
The performance of determining number of spoofing attackers can be improved further by using SVM
based mechanism. In this section, Support Vector Machines is used to classify the number of spoofing attackers
and hence to improve the detection rate. SVM accurately predicts the number of attackers by using model based
on training data. The comparison between the results of SVM to those of Silhouette Plot, System Evolution and
SILENCE methods leads to the final decision that SVM is the best one as it gives significant increase in Hit rate,
Precision etc.

V.

IDOL.

This section gives the Integrated Detection and Localization Model. Our integrated detection and
localization system makes use of localization algorithm so as to detect or estimate the positions of adversaries or
attackers. Here this model utilizes RSS medoids returned from SILENCE as inputs to localization algorithms.
The resulted returned positions include the location estimate of the original node and the attacker in the physical
space. When an adversary residing at a physical location
Varies its transmission power to perform a spoofing attack, the difference of the RSS readings between
two different landmarks from the adversary is a constant since the RSS readings are obtained from a single
physical location. We can then utilize the difference of the medoids vectors in signal space obtained from
SILENCE to localize adversaries. In this way on improving [14] the advanced enhancement is obtained as
IDOL.

www.theijes.com

The IJES

Page 4
Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network.
The proposed model makes use of three such localization algorithms:RADAR Grid algorithm
Area Based Probabilistic algorithm
Multilateration algorithm
1. RADAR Grid: This algorithm is the scene matching algorithm given in [15].It uses an interpolated signal map, which
is built from a set of averaged RSS readings with known (x, y) locations. It returns the x, y of the nearest
neighbor in the signal map to the one to localize, where ―nearest‖ is defined as the Euclidean distance of RSS
points in an N-dimensional signal space, where N is the number of landmarks.
2. Area Based Probabilistic algorithm:
This algorithm is given in [16].Then here it is further extended to give value of P (Li/S).
Here the given experimental area is divided into a regular grid of equal-sized tiles. ABP
Assumes the distribution of RSS for each landmark follows a Gaussian distribution with mean as the expected
value of RSS reading vector s. ABP then computes the probability of the wireless device being at each tile Li,
with i = 1 . . .L,
On the floor using Bayes’ rule
P (Li/S) = P(S/Li) × P (Li) ⁄ P(S)
This gives the probable area of location where the attackers or adversaries may be present. From this
probable location actual position of adversaries can be obtained in terms of x and y co-ordinates using
multilateration algorithm.
3. Multilateration algorithm:
Bayesian network localization is the multilateration algorithm [19].This proposed algorithm encodes
signal to distance propagation model into Bayesian Graphical Model for localization.

Fig 3.Bayesian Model Overview
Here Di represents the Euclidean distance between the location specified by X and Y. (xi, yi) be the coordinates of ith landmark.

VI.

CONCLUSION.

In this proposed work, we utilize the Received Signal Strength (RSS) -based spatial co-relation. RSS is
associated with wireless nodes as its physical property which is hard to falsify and not reliant on cryptography
as basis for detecting spoofing attacks in wireless networks. We provided the theoretical analysis of using RSSbased spatial co-relation readings with GADE so as to detect the spoofing attack in the system. The Multiclass
Detection problem, SILENCE mechanism proposed to detect number of adversaries in the network. Also further
SVM is proposed to improve the accuracy in detecting number of adversaries. Then enhanced IDOL model is
proposed to localize the attackers in the system. This integrated model utilizes number of attackers from
SILENCE mechanism and then using RADAR Gridded algorithm can find actual location and position of such
spoofing attackers in the wireless networks. To test the proposed system we conducted experiments, such results
from experiments also showed that this proposed technique reliant on RSS is more accurate and secure than
existing one.

www.theijes.com

The IJES

Page 5
Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]

J. Bellardo and S. Savage, ―802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,‖ Proc. USENIX
Security Symp. pp. 15-28, 2003.
F. Ferreri, M. Bernaschi, and L. Valcamonici, ―Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE
Wireless Comm. and Networking Conf., 2004.
D. Faria and D. Cheriton, ―Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,‖ Proc. ACM Workshop
Wireless Security (WiSe), Sept. 2006.
Q. Li and W. Trappe, ―Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,‖ Proc. Ann.
IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006.
B. Wu, J. Wu, E. Fernandez, and S. Magliveras, ―Secure and Efficient Key Management in Mobile Ad Hoc Networks,‖ Proc.
IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005.
A. Wool, ―Lightweight Key Management for IEEE 802.11 Wireless Lans with Key Refresh and Host Revocation,‖
ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, ―Detecting 802.11 MAC Layer Spoofing Using Received Signal
Strength,” Proc. IEEE INFOCOM, Apr. 2008.
L. Xiao, L.J. Greenstein, N.B. Mandayam, and W. Trappe, ―Fingerprints in the Ether: Using the Physical Layer for Wireless
Authentication,‖ Proc. IEEE Int’l Conf. Comm. (ICC), pp. 4646-4651, June 2007.
F. Guo and T. Chiueh, ―Sequence Number-Based MAC Address Spoof Detection,‖ Proc. Eighth Int’l Conf. Recent Advances in
Intrusion Detection, pp. 309-329, 2006.
L. Sang and A. Arora, ―Spatial Signatures for Lightweight Security in Wireless Sensor Networks,‖ Proc. IEEE INFOCOM, pp.
2137- 2145, 2008.
Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, ―A Practical Approach to Landmark Deployment for Indoor
Localization,‖Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks.(SECON), Sept. 2006.
L. Kaufman and P.J. Rousseeuw, Finding Groups in Data: An Introduction to Cluster Analysis. Wiley Series in Probability and
Statistics, 1990.
G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic, ―Models and Solutions for Radio Irregularity in Wireless Sensor
Networks,‖ACM Trans. Sensor Networks, vol. 2, pp. 221-262, 2006.
C. van Rijsbergen, Information Retrieval, second ed. Butterworths,1979.
P. Bahl and V.N. Padmanabhan, ―RADAR: An in-Building RFBased User Location and Tracking System,‖ Proc. IEEE
INFOCOM, 2000.
E. Elnahrawy, X. Li, and R.P. Martin, ―The Limits of Localization Using Signal Strength: A Comparative Study,‖ Proc. IEEE
Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Oct. 2004.
P. Rousseeuw, ―Silhouettes: A Graphical Aid to the Interpretation and Validation of Cluster Analysis,‖ J. Computational and
Applied Math., vol. 20, no. 1, pp. 53-65, Nov. 1987.
K. Wang, ―Estimating the Number of Clusters via System Evolution for Cluster Analysis of Gene Expression Data,‖ Technical
Report NO. 2007-258, Computer Science Dept., Xidian Univ., P.R. China, 2007.
D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A.S. Krishnakumar, ―Bayesian Indoor theorem‖.

www.theijes.com

The IJES

Page 6

More Related Content

What's hot

Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networksrahulmonikasharma
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...IRJET Journal
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired prjpublications
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Trusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFTrusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFEditor IJMTER
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelesseSAT Publishing House
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
 

What's hot (20)

Clone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor NetworksClone Node Detection in Wireless Sensor Networks
Clone Node Detection in Wireless Sensor Networks
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Trusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFTrusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARF
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 

Viewers also liked

D030101017022
D030101017022D030101017022
D030101017022theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
A0333001007
A0333001007A0333001007
A0333001007theijes
 
F0325041052
F0325041052F0325041052
F0325041052theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
H0314052063
H0314052063H0314052063
H0314052063theijes
 
B03250609
B03250609B03250609
B03250609theijes
 
L030102085095
L030102085095L030102085095
L030102085095theijes
 
H0313041047
H0313041047H0313041047
H0313041047theijes
 
F030101030037
F030101030037F030101030037
F030101030037theijes
 
J0334063069
J0334063069J0334063069
J0334063069theijes
 
G0333035038
G0333035038G0333035038
G0333035038theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
P0333086093
P0333086093P0333086093
P0333086093theijes
 
E0315030039
E0315030039E0315030039
E0315030039theijes
 
J030102064073
J030102064073J030102064073
J030102064073theijes
 
B0313010014
B0313010014B0313010014
B0313010014theijes
 

Viewers also liked (19)

D030101017022
D030101017022D030101017022
D030101017022
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
A0333001007
A0333001007A0333001007
A0333001007
 
F0325041052
F0325041052F0325041052
F0325041052
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
H0314052063
H0314052063H0314052063
H0314052063
 
B03250609
B03250609B03250609
B03250609
 
L030102085095
L030102085095L030102085095
L030102085095
 
H0313041047
H0313041047H0313041047
H0313041047
 
F030101030037
F030101030037F030101030037
F030101030037
 
J0334063069
J0334063069J0334063069
J0334063069
 
G0333035038
G0333035038G0333035038
G0333035038
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
P0333086093
P0333086093P0333086093
P0333086093
 
E0315030039
E0315030039E0315030039
E0315030039
 
J030102064073
J030102064073J030102064073
J030102064073
 
B0313010014
B0313010014B0313010014
B0313010014
 

Similar to A030101001006

IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
Detection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless networkDetection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless networkAM Publications
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityeSAT Journals
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection Systemtheijes
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET Journal
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for networkeSAT Publishing House
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 

Similar to A030101001006 (20)

IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Detection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless networkDetection of Spoofing attackers in wireless network
Detection of Spoofing attackers in wireless network
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network security
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
 
I1802046780
I1802046780I1802046780
I1802046780
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

A030101001006

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume|| 3 ||Issue|| 01 || Pages || 01-06 || 2014|| ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network 1, Archana Shelar, 2, Guide: M.D.Ingale 1, (M.E (Computer) student, Pune University) 2, (Asst.Prof, Pune University) ------------------------------------------------------ABSTRACT---------------------------------------------------As the current age is the age of computers, the wireless spoofing attacks that can be easily launched and these attacks also degrade the performance of the system or networks. The cryptography can be used to maintain security in such networks but such conventional approach can’t be desirable due to its overhead requirements. Hence in this paper we propose to use RSS (Received Signal Strength) i.e. the spatial information which is the physical property of each node. This physical property is not reliant on any cryptographic scheme and also it is hard to falsify n hence essential to use. This paper mainly focuses on-A.To Detect spoofing attacks in the network B. Determines the number of attackers C. Localizing multiple attackers. The spoofing attacks can be detected using RSS (Received Signal Strength) and Medoids levels which can be inherited from wireless nodes in the network. Also we then use the multiclass detection problem to find number of spoofing attackers. Further the IDOL model is used to localize positions of actual attackers. Our experimental results show that the techniques used in this paper provide high level of security with topmost hit rate and precision, also it gives the accuracy in localizing multiple adversaries. Keywords: - Spoofing attack, Attack detection, Localizing attack, Wireless network security. --------------------------------------------------------------------------------------------------------------------------- -----------Date of Submission: 20 December 2013 Date of Acceptance: 08 January 2014 ----------------------------------------------------------------------------------------------------------------------------- ---------- I. INTRODUCTION. As computing and performing networks are shifting from wired intrastructure to the wireless, mobile and open communication networks, for increasing the speed of computation. But such networks are easily susceptible for multiple and variety of adversary attacks like spoofing attacks [1][2][3][4]. Basically the identity based spoofing attacks or masquerading attacks are easy to launch and also it can cause significant damage to the network performance. Spoofing attacks also facilitate various types of traffic injection attacks, such as attacks on access control Lists (ACL), rogue access point (AP) attacks, and eventually Denial of- Service (DoS) attacks. The cryptographic techniques can be used to address such type of security violations. However, the application of cryptographic schemes requires reliable key distribution, management, and maintenance mechanisms. It is not always desirable to apply these cryptographic methods because of its infrastructural, computational, and management overhead. Further, these cryptographic methods are also susceptible to node compromise, which is a serious concern as most wireless nodes are easily accessible, allowing their memory to be easily scanned. In this paper work we propose to use received signal strength (RSS)-based spatial correlation. It can be used mainly for- A. Detect the presence of spoofing attacks B.Determine the number of attackers C. Localize multiple adversaries and eliminate them. RSS it’s a physical property associated with each node. It is also hard to falsify and not reliant on cryptography. As here we are concerned with attackers with different locations than legitimate wireless nodes, utilizing such spatial information to address spoofing attacks has the unique power to not only identify the presence of these attacks but also localize adversaries. The enhanced advantage of this RSS based spatial corelation is that--it will not require any additional cost or modification to the wireless devices themselves. Previously the Sheng et al. used RSS and K-means cluster analysis to detect spoofing attacks. However, none of these approaches have the ability to determine the number of attackers when multiple adversaries use the same identity to launch attacks, which is the basis to further localize multiple adversaries after attack detection. The main focus of our work is— www.theijes.com The IJES Page 1
  • 2. Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network. 1. A generalized attack detection model (GADE): It can detect the spoofing attack in the network as well as can determine the number of spoofing attackers in the same system. Here the attack detection can be performed using Partitioning around Medoids (PAM) which calculates the medoid distance. If the medoid distance value is small it means that spoofing attack is not detected but if it is large then it signifies that spoofing attack is detected. Then we used cluster based Multiclass detection problem to determine number of spoofing attackers. Also further we developed and used the SILENCE mechanism to improve the accuracy of finding number of attackers. 2. Integrated detection and localization system (IDOL):-IDOL can detect the attacks and also can accurately localize the positions of spoofing adversaries or attackers. Here IDOL model uses the results returned by GADE model. One key observation is that IDOL can handle attackers using different transmission power levels, and hence provides strong evidence of the effectiveness of localizing adversaries when there are multiple attackers in the network. The rest of the paper is organized as follows. We provide the Existing Approach in Section 2.We provide Proposed system with model in section 3.We describe cluster based Multiclass Detection Problem in section 4.Then we provide advanced IDOL model in section 5. II. EXISTING TRADITIONAL APPROACH. Cryptography is the traditional approach to prevent and detect spoofing attack. It needs secure key management and respective framework. The Public Key Interface (PKI) can be used further to reduce the overhead of key management [5][6]. Also to avoid key compromisation, wool implemented key management mechanism with periodic key refresh and host revocation. However such cryptographic authentication may not be always applicable because of the limited resources on wireless devices and lacking of a fixed key management infrastructure in the wireless network. For ex. The Wired Equivalent Privacy protocol is used in 802.11 networks to protect link-level data during wireless transmission. It depicts Following properties:WEP relies on a secret key shared between the communicating parties to protect the body of a transmitted frame of data. Encryption of a frame proceeds as follows: Encryption: In the second stage, we encrypt the plaintext derived above using RC4. We choose an initialization vector (IV). The RC4 algorithm generates a keystream i.e., a long sequence of pseudorandom bytes—as a function of the IV and the key. This Then, we use exclusive-or (XOR, denoted by) the plaintext with the key stream to obtain the ciphertext. Transmission: Finally, we transmit the IV and the ciphertext over the radio link. Recently the current approaches use physical properties like RSS (Received Signal Strength) associated with wireless nodes so as to address spoofing attacks in the wireless network. The channel-based authentication scheme was proposed to discriminate between transmitters at different locations, and thus used to detect spoofing attacks in wireless networks [8].Li and Trappe [4] introduced a security layer that used forge-resistant relationships based on the packet traffic, including MAC sequence number and traffic pattern, to detect spoofing attacks. The MAC sequence number has also been used in [9] to perform spoofing detection. Both the sequence number and the traffic pattern can be manipulated by an adversary as long as the adversary learns the traffic pattern under normal conditions. The basic RSS work was also proposed in [3], [7], [10]. However, none of these approaches are capable of determining the number of attackers when there are multiple adversaries collaborating to use the same identity to launch malicious attacks. Also they do not have the ability to localize the positions of the adversaries after attack detection. Here is the main point that our work uses the spatial information to detect the attacks instead of any cryptographic scheme, and hence it differs from the previous techniques. Additionally our approach is innovative and more creative as it helps find number of spoofing attackers and also gives the accuracy in localizing such multiple adversaries masquerading with the same identity. www.theijes.com The IJES Page 2
  • 3. Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network. III. PROPOSED SYSTEM. GADE IDOL Fig.1 gives the overall pictorial presentation of this new security technique. Fig 1.Overall working view of the system 1.GADE(Generalised attack Detection Model):- Here we used to porpose RSS,a physical proprety closely co-related with location in physical space and also it is readily available in the existing wireless networks. As RSS can be affected due to random noise, environmental bias, and multipath effects then also the RSS measured at a set of landmarks is closely related to the transmitter’s physical location [11].According to this the RSS readings present strong spatial correlation characteristics. The RSS vector is defined with value vector as- S= {s1, s2, s3… sn} where n is the number of landmarks/access points that are monitoring the RSS of the wireless nodes and know their locations. In case of spoofing attack, the two main elements are  Victim Attacker Here both can transmit data packets by using same ID and the RSS readings of that ID is the mixture of readings measured from each individual node (i.e., spoofing node or victim node). Since under a spoofing attack, the RSS readings from the victim node and the spoofing attackers are mixed together, this observation suggests that we may conduct cluster analysis on top of RSS-based spatial correlation to find out the distance in signal space and further detect the presence of spoofing attackers in physical space. In this paper work, we propose to use Partitioning around Medoids (PAM) Method so as to perform clustering analysis in RSS. The PAM Method is a popular iterative descent clustering algorithm [12]. Also the evaluation results showed that PAM method is more robust than popular K-means clustering algorithm [13].Particularly our objective in this method is to detect the presence of attacks. Here null hypothesis indicates that no spoofing attack. T is the Test spec i.e. (Test specification) it is used to indicate wether observed data belongs to the null hypothesis or not. We then consider the distance between two medoids as Dm. Dm=║Mi-Mj║ Where Mi and Mj are the medoids of two clusters. Under normal condition (i.e. when there is no spoofing attack) it is treated that basically there should be only one cluster from a single physical location. In such normal case Dm should be small. However, under a spoofing attack, there is more than one node at different physical locations claiming the same node identity. As a result, more than one cluster will be formed in the signal space and hence Dm will be large as the medoids are derived from the different RSS clusters associated with different locations in physical space. Finally this model suggests that if the value of D m distance is small then it means that there is no spoofing attack present in the system. But if Dm distance is large then it means that spoofing attack is detected. www.theijes.com The IJES Page 3
  • 4. Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network. IV. MULTICLASS DETECTION PROBLEM. Multiclass detection problem includes determining number of attackers and similar in determining how many clusters existing in the RSS readings. Pi=Ci Ni= Ụ cj € C Here C is the set of all classes.ci is the specific number of attackers under particular class.Ni is the all other class as negative class. The related precision and F-measure are in[14].This gives the number of attackers in the system. 4.1 SILENCE Mechanism. Fig.2.Cluster Representation view This SILENCE mechanism’s basic Silhouette Plot for cluster is in [17][18].Based on this observation we developed SILENCE,SILhouette Plot and System EvolutioN with minimum distanCE of cluster. This evaluates the minimum distance between clusters so as to improve the accuracy of determining the number of Attackers. SILENCE gives the K as number of attackers in the system. This K also depends on Dm-that’s the distance between medoids. 4.2 Support Vector Machine (SVM) based mechanism. SVM is a set of kernel-based learning Methods for data classification that involves a training phase and a testing phase [19]. Here each data instance in the training set consists of a target value (i.e., class label) and several attributes (i.e., features). The performance of determining number of spoofing attackers can be improved further by using SVM based mechanism. In this section, Support Vector Machines is used to classify the number of spoofing attackers and hence to improve the detection rate. SVM accurately predicts the number of attackers by using model based on training data. The comparison between the results of SVM to those of Silhouette Plot, System Evolution and SILENCE methods leads to the final decision that SVM is the best one as it gives significant increase in Hit rate, Precision etc. V. IDOL. This section gives the Integrated Detection and Localization Model. Our integrated detection and localization system makes use of localization algorithm so as to detect or estimate the positions of adversaries or attackers. Here this model utilizes RSS medoids returned from SILENCE as inputs to localization algorithms. The resulted returned positions include the location estimate of the original node and the attacker in the physical space. When an adversary residing at a physical location Varies its transmission power to perform a spoofing attack, the difference of the RSS readings between two different landmarks from the adversary is a constant since the RSS readings are obtained from a single physical location. We can then utilize the difference of the medoids vectors in signal space obtained from SILENCE to localize adversaries. In this way on improving [14] the advanced enhancement is obtained as IDOL. www.theijes.com The IJES Page 4
  • 5. Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network. The proposed model makes use of three such localization algorithms:RADAR Grid algorithm Area Based Probabilistic algorithm Multilateration algorithm 1. RADAR Grid: This algorithm is the scene matching algorithm given in [15].It uses an interpolated signal map, which is built from a set of averaged RSS readings with known (x, y) locations. It returns the x, y of the nearest neighbor in the signal map to the one to localize, where ―nearest‖ is defined as the Euclidean distance of RSS points in an N-dimensional signal space, where N is the number of landmarks. 2. Area Based Probabilistic algorithm: This algorithm is given in [16].Then here it is further extended to give value of P (Li/S). Here the given experimental area is divided into a regular grid of equal-sized tiles. ABP Assumes the distribution of RSS for each landmark follows a Gaussian distribution with mean as the expected value of RSS reading vector s. ABP then computes the probability of the wireless device being at each tile Li, with i = 1 . . .L, On the floor using Bayes’ rule P (Li/S) = P(S/Li) × P (Li) ⁄ P(S) This gives the probable area of location where the attackers or adversaries may be present. From this probable location actual position of adversaries can be obtained in terms of x and y co-ordinates using multilateration algorithm. 3. Multilateration algorithm: Bayesian network localization is the multilateration algorithm [19].This proposed algorithm encodes signal to distance propagation model into Bayesian Graphical Model for localization. Fig 3.Bayesian Model Overview Here Di represents the Euclidean distance between the location specified by X and Y. (xi, yi) be the coordinates of ith landmark. VI. CONCLUSION. In this proposed work, we utilize the Received Signal Strength (RSS) -based spatial co-relation. RSS is associated with wireless nodes as its physical property which is hard to falsify and not reliant on cryptography as basis for detecting spoofing attacks in wireless networks. We provided the theoretical analysis of using RSSbased spatial co-relation readings with GADE so as to detect the spoofing attack in the system. The Multiclass Detection problem, SILENCE mechanism proposed to detect number of adversaries in the network. Also further SVM is proposed to improve the accuracy in detecting number of adversaries. Then enhanced IDOL model is proposed to localize the attackers in the system. This integrated model utilizes number of attackers from SILENCE mechanism and then using RADAR Gridded algorithm can find actual location and position of such spoofing attackers in the wireless networks. To test the proposed system we conducted experiments, such results from experiments also showed that this proposed technique reliant on RSS is more accurate and secure than existing one. www.theijes.com The IJES Page 5
  • 6. Modeling Security with Localization of Multiple Spoofing Attackers in Wireless Network. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] J. Bellardo and S. Savage, ―802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,‖ Proc. USENIX Security Symp. pp. 15-28, 2003. F. Ferreri, M. Bernaschi, and L. Valcamonici, ―Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004. D. Faria and D. Cheriton, ―Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,‖ Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006. Q. Li and W. Trappe, ―Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,‖ Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006. B. Wu, J. Wu, E. Fernandez, and S. Magliveras, ―Secure and Efficient Key Management in Mobile Ad Hoc Networks,‖ Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005. A. Wool, ―Lightweight Key Management for IEEE 802.11 Wireless Lans with Key Refresh and Host Revocation,‖ ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005 Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, ―Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008. L. Xiao, L.J. Greenstein, N.B. Mandayam, and W. Trappe, ―Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication,‖ Proc. IEEE Int’l Conf. Comm. (ICC), pp. 4646-4651, June 2007. F. Guo and T. Chiueh, ―Sequence Number-Based MAC Address Spoof Detection,‖ Proc. Eighth Int’l Conf. Recent Advances in Intrusion Detection, pp. 309-329, 2006. L. Sang and A. Arora, ―Spatial Signatures for Lightweight Security in Wireless Sensor Networks,‖ Proc. IEEE INFOCOM, pp. 2137- 2145, 2008. Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, ―A Practical Approach to Landmark Deployment for Indoor Localization,‖Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks.(SECON), Sept. 2006. L. Kaufman and P.J. Rousseeuw, Finding Groups in Data: An Introduction to Cluster Analysis. Wiley Series in Probability and Statistics, 1990. G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic, ―Models and Solutions for Radio Irregularity in Wireless Sensor Networks,‖ACM Trans. Sensor Networks, vol. 2, pp. 221-262, 2006. C. van Rijsbergen, Information Retrieval, second ed. Butterworths,1979. P. Bahl and V.N. Padmanabhan, ―RADAR: An in-Building RFBased User Location and Tracking System,‖ Proc. IEEE INFOCOM, 2000. E. Elnahrawy, X. Li, and R.P. Martin, ―The Limits of Localization Using Signal Strength: A Comparative Study,‖ Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Oct. 2004. P. Rousseeuw, ―Silhouettes: A Graphical Aid to the Interpretation and Validation of Cluster Analysis,‖ J. Computational and Applied Math., vol. 20, no. 1, pp. 53-65, Nov. 1987. K. Wang, ―Estimating the Number of Clusters via System Evolution for Cluster Analysis of Gene Expression Data,‖ Technical Report NO. 2007-258, Computer Science Dept., Xidian Univ., P.R. China, 2007. D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A.S. Krishnakumar, ―Bayesian Indoor theorem‖. www.theijes.com The IJES Page 6