Open Access Open Access  Restricted Access Subscription or Fee Access

Detection and Localization of Multiple Spoofing AttackersAnd Revoking Them in Wireless Networks

R. Mekala, J. Sobana, V. Arul, B. Keerthana

Abstract


Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. The project is proposed to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. It is proposed to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, the project explores using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. The localization results use a representative set of algorithms that provide strong evidence of high accuracy of localizing multiple adversaries. In addition, a fast and effective mobile replica node detection scheme is proposed using the Sequential Probability Ratio Test. evaluated our techniques through two testbedsusing both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real officebuildings.

Keywords


Wireless Network Security, Spoofing Attack, Attack Detection, Localization

Full Text:

PDF

References


Chen Y., Trappe W., and Martin R.P. (May 2007) ―Detecting and Localizing Wireless Spoofing Attacks‖, Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks, pp.5-10.

Faria D. and Cheriton D. (2006) ―Detecting Identity-Based Attacks in Wireless Networks Using Signalprints‖, Proc. ACM Workshop Wireless Security (WiSe).

Sheng Y., Tan K., Chen G., Kotz D. and Campbell A. (2008) ―Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength‖, Proc. IEEE INFOCOM.

Li Q. and Trappe W. (2006) ―Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks‖, Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks, pp.6-8.

Guo F. and Chiueh T.( 2006) ―Sequence Number-Based MAC Address Spoof Detection‖, Proc. Eighth Int’l Conf. Recent Advances in Intrusion Detection,pp. 309-329.

Sang L. and Arora A. (2008) ‖Spatial Signatures for Lightweight Security in Wireless Sensor Networks‖, Proc. IEEE INFOCOM, pp. 2137-2145.

Brik V., Banerjee S., Gruteser M. and Oh s. (2008) ―Wireless Device Identification with Radiometric Signatures‖ ,Proc. 14th ACM Int’l Conf. Mobile Computing and Networking, pp. 116-127.

Chen Y., Kleisouris K., Li X., Trappe W. and Martin R.P. (2006) ―The Robustness of Localization Algorithms to Signal Strength Attacks: A

Comparative Study‖, Proc. Int’l Conf. Distributed Computing in Sensor Systems (DCOSS), pp. 546-563.

Bohge M. and Trappe W. (2003) ―An Authentication Framework for Hierarchical Ad Hoc Sensor Networks‖, Proc. ACM Workshop Wireless Security (WiSe), pp. 79-87.

Ferreri F., Bernaschi M., and Valcamonici L. (2004) ―Access Points Vulnerabilities to Dos Attacks in 802.11 Networks‖, Proc. IEEE Wireless Comm. and Networking Conf.

Franc V. and Hlava´c V. (2002) ―Multi-Class Support Vector Machine‖,Proc. Int’l Conf. Pattern Recognition (ICPR), vol. 16, pp. 236-239.

Wool A. (2005) ―Lightweight Key Management for IEEE 802.11 Wireless LansWith Key Refresh and Host Revocation‖, ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686.

Wu B., Wu J., Fernandez E. and Magliveras S. (2005) ―Secure and Efficient Key Management in Mobile Ad Hoc Networks‖, Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS).

Wang k. (2007) ―Estimating the Number of Clusters via System Evolution for Cluster Analysis of Gene Expression Data‖,Technical Report NO. 2007-258, Computer Science Dept..

Bellardo J. and Savage S. (2003) ―802.11 Denial-of-Service Attacks:Real Vulnerabilities and Practical Solutions‖, pp. 15-28.

E. Elnahrawy, X. Li, and R.P. Martin, ―The Limits of LocalizationUsing Signal Strength: A Comparative Study,‖ Proc. IEEE Int’lConf. Sensor and Ad Hoc Comm. and Networks (SECON), Oct. 2004.

Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, ―A Practica Approach to Landmark Deployment for Indoor Localization, Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Sept. 2006.

J. Yang and Y. Chen, ―A Theoretical Analysis of Wireless Localization Using RF-Based Fingerprint Matching,‖ Proc. Fourth Int’l Workshop System Management Techniques, Processes, and Services (SMTPS), Apr. 2008.

Z. Yang, E. Ekici, and D. Xuan, ―A Localization-Based Anti-Sensor Network System,‖ Proc. IEEE INFOCOM, pp. 2396-2400, 2007.

T. He, C. Huang, B. Blum, J.A. Stankovic, and T. Abdelzaher, ―Range-Free Localization Schemes in Large Scale Sensor Networks,‖ Proc. MobiCom ’03, 2003.

L. Kaufman and P.J. Rousseeuw, Finding Groups in Data: An Introduction to Cluster Analysis. Wiley Series in Probability and Statistics, 1990.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.