ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Multiple Spoofing Adversaries Detection and Localization in Wireless Networks

Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.3, No. 5)

Publication Date:

Authors : ; ; ;

Page : 495-499

Keywords : attack detection; localization; spoofing attack; wireless network security;

Source : Downloadexternal Find it from : Google Scholarexternal


The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to forge, and not contingent on cryptography, as the beginning for, detecting spoofing attacks, determining the number of attackers when multiple adversaries hidden as the same node identity and localizing multiple adversaries. To use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. An integrated detection and localization system is developed to localize the positions of multiple attackers.

Last modified: 2014-09-27 22:12:26