A Study on Multiple Spoofing Attack Detection and Prevention in Wireless Networks

L Jeyakumar

Abstract


Since wireless spoofing attacks significantly impact the performance of networks, this study is carried out to detect and prevent them. In wireless networks, the identity of a node is verified through cryptographic authentication. So conventional security approaches is not desirable due to the overhead requirements. This attack detection framework is proposed which uses spatial information, a physical property associated with each node, hard to compromise, and it is not reliant on cryptography.

 

This framework detects spoofing attack, determines the number of attackers when multiple adversaries masquerading as the same node identity 4 spatial correlation of received signal strength (RSS) inherited from wireless nodes. It also designates the problem of determining the number of attackers as a multi-class detection problem.

 

Moreover, it develops an integrated detection and localization system that can localize the positions of multiple attackers.  In addition, a fast and effective mobile replica node detection scheme is proposed using the Sequential Probability Ratio Test. So the proposed framework tackles the problem of spoofing attacks in mobile sensor networks. Through simulation experiments, the scheme detects mobile replicas in an efficient manner at the cost of reasonable overheads.


Keywords


Spoofing attack, Received signal strength, Replica node detection, Localization.

References


S. Capkun and J.P. Hubaux. Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2):221–232, February 2006.

J. Ho, D. Liu, M. Wright, and S.K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks,” Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.

L. Zhou and Z. Haas, “Securing Ad Hoc Networks,” IEEE Network Special Issue on Network Security, 13, 6, 24-30, November 1999.

F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004.

Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing-Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEEComm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006.

Y. Yang, X. Wang, S. Zhu, and G. Cao. Distributed software-based attestation for node compromise detection in sensor networks. In IEEE SRDS, October 2007

A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.

Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu, Lixia Zhang, “Self-securing Ad Hoc Wireless Networks,” IEEE ISCC (IEEE Symposium on Computers and Communications) 2002, Italy.

W. Du, L. Fang, and P. Ning, “LAD: Localization Anomaly Detection for Wireless Sensor Networks,” the 19th International Parallel and Distributed Priocessing Symposium (IPDPS’05), April 3 – 8, 2005, Denver, Colorado, USA.

S.Capkun and J.P. Hubaux, “Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221- 232, Feb. 2006.

L. Hu and D. Evans, “Localization for Mobile Sensor Networks,” Proc. ACM MobiCom, pp. 45-57, Sept. 2004.

J. Ho, D. Liu, M. Wright, and S.K. Das, “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks,” Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488, Nov. 2009.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

.......................................................................................................................................................................................................................

ISSN  2279 – 0381 |  IST HOMEJOURNAL HOME | Copyright IST 2012-13

.......................................................................................................................................................................................................................