19 Nov 2014

DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS IN WIRELESS NETWORKS



DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING
ATTACKERS IN WIRELESS NETWORKS



ABSTRACT:
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
EXISTING SYSTEM:

In the EXISTING SYSTEM, due to the open medium  in Wireless Sensor Networks, spoofing attacks are easy to launch and can significantly impact the performance of networks. So that the nodes can be easily compromised and perform malicious activities. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements.

DISADVANTGES:

·         Spoofing Attacks can be easily launched.
·         Nodes can be easily compromised and perform malicious activities. 

PROPOSED SYSTEM:

In the PROPOSED SYSTEM, we are implementing three steps 1. Detection of Spoofing attacks based on Received Signal Strength.  2. Determining the number of attackers when multiple adversaries masquerading the same node identity. So that we can identify the attackers who are all performing the spoofing attacks. 3. Localizing the multiple adversaries and eliminate them from the network if necessary. So that the other nodes may know about the attacker nodes in the Wireless Sensor Networks.


ADVANTAGES:

·         Easy to detect the spoofing attacks.
·         Eliminating the attacker node will provide more security to the network.
·         Encrypting the data packets  restrict the intermediate nodes from viewing the original data. 


SYSTEM REQUIREMENTS:
SOFTWARE REQUIREMENTS:

§  Platform                :Windows XP
§  Front End             : Java JDK1.5.
§  Back End              : MYSQL

HARDWARE REQUIREMENTS:

§  Processor                           :           Pentium IV
§  RAM                                :            512 MB
§  HDD                                :            80 GB

CONCLUSIONS:

In this work, we proposed to use received signal strength based spatial correlation, a physical property associated with each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in wireless networks. We provided theoretical analysis of using the spatial correlation of RSS inherited from wireless nodes for attack detection. We derived the test statistic based on the cluster analysis of RSS readings. Our approach can detect the presence of attacks as well as determine the number of adversaries, spoofing the same node identity, so that we can localize any number of attackers and eliminate them. Determining the number of adversaries is a particularly challenging problem. We developed SILENCE, a mechanism that employs the minimum distance testing in addition to cluster analysis to achieve better accuracy of determining the number of attackers than other methods under study, such as Silhouette Plot and System Evolution that use cluster analysis alone. Additionally, when the training data are available, we explored using Support Vector Machines-based mechanism to further improve the accuracy of determining the number of attackers present in the system.


No comments:

Post a Comment

Note: only a member of this blog may post a comment.