DETECTION
AND LOCALIZATION OF MULTIPLE SPOOFING
ATTACKERS
IN WIRELESS NETWORKS
ABSTRACT:
Wireless
spoofing attacks are easy to launch and can significantly impact the
performance of networks. Although the identity of a node can be verified
through cryptographic authentication, conventional security approaches are not
always desirable because of their overhead requirements. In this paper, we
propose to use spatial information, a physical property associated with each node,
hard to falsify, and not reliant on cryptography, as the basis for 1) detecting
spoofing attacks; 2) determining the number of attackers when multiple
adversaries masquerading as the same node identity; and 3) localizing multiple
adversaries. We propose to use the spatial correlation of received signal
strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We
then formulate the problem of determining the number of attackers as a
multiclass detection problem. Cluster-based mechanisms are developed to
determine the number of attackers. When the training data are available, we
explore using the Support Vector Machines (SVM) method to further improve the
accuracy of determining the number of attackers. In addition, we developed an
integrated detection and localization system that can localize the positions of
multiple attackers. We evaluated our techniques through two testbeds using both
an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office
buildings. Our experimental results show that our proposed methods can achieve
over 90 percent Hit Rate and Precision when determining the number of
attackers. Our localization results using a representative set of algorithms
provide strong evidence of high accuracy of localizing multiple adversaries.
EXISTING
SYSTEM:
In the EXISTING
SYSTEM, due to the open medium in
Wireless Sensor Networks, spoofing attacks are easy to launch
and can significantly impact the performance of networks. So that the nodes can
be easily compromised and perform malicious activities. Although the identity
of a node can be verified through cryptographic authentication, conventional
security approaches are not always desirable because of their overhead
requirements.
DISADVANTGES:
·
Spoofing Attacks can be easily launched.
·
Nodes can be easily compromised and
perform malicious activities.
PROPOSED
SYSTEM:
In
the PROPOSED SYSTEM, we are implementing three steps
1. Detection of Spoofing attacks based on Received Signal Strength. 2. Determining the number of attackers when
multiple adversaries masquerading the same node identity. So that we can
identify the attackers who are all performing the spoofing attacks. 3.
Localizing the multiple adversaries and eliminate them from the network if
necessary. So that the other nodes may know about the attacker nodes in the
Wireless Sensor Networks.
ADVANTAGES:
·
Easy to detect the spoofing attacks.
·
Eliminating the attacker node will
provide more security to the network.
·
Encrypting the data packets restrict the intermediate nodes from viewing
the original data.
SYSTEM
REQUIREMENTS:
SOFTWARE
REQUIREMENTS:
§ Platform :Windows
XP
§ Front End : Java JDK1.5.
§ Back End :
MYSQL
HARDWARE
REQUIREMENTS:
§ Processor : Pentium IV
§ RAM : 512
MB
§ HDD : 80
GB
CONCLUSIONS:
In
this work, we proposed to use received signal strength based spatial
correlation, a physical property associated with each wireless device that is
hard to falsify and not reliant on cryptography as the basis for detecting
spoofing attacks in wireless networks. We provided theoretical analysis of
using the spatial correlation of RSS inherited from wireless nodes for attack
detection. We derived the test statistic based on the cluster analysis of RSS
readings. Our approach can detect the presence of attacks as well as determine
the number of adversaries, spoofing the same node identity, so that we can
localize any number of attackers and eliminate them. Determining the number of
adversaries is a particularly challenging problem. We developed SILENCE, a
mechanism that employs the minimum distance testing in addition to cluster
analysis to achieve better accuracy of determining the number of attackers than
other methods under study, such as Silhouette Plot and System Evolution that
use cluster analysis alone. Additionally, when the training data are available,
we explored using Support Vector Machines-based mechanism to further improve
the accuracy of determining the number of attackers present in the system.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.