BY M.Loganathan Guided by Mrs - Alagumeenaakshi

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 12

BY M.Loganathan GUIDED BY Mrs.

Alagumeenaakshi

Objective
To detect the presence of spoofing attacks.
Determine the number of attackers. Localize multiple adversaries.

Introduction
Highly distributed networks of small, lightweight wireless node,

-to monitor the environment or system.

Tempts targets for malicious attacks. Spoofing attacks -represent a form of identity compromise

and can facilitate a variety of traffic injection attacks, such as evil twin access point attacks. Desirable to detect the presence of spoofing and eliminate them from the network.

Spoofing
Spoofing attack is a situation in which one person or program

successfully masquerades as another by falsifying data and there by gaining an illegitimate advantage

SYSTEM ARCHITECTURE
Base Station
LA Node A LB Node B LC Node C LD Node B Node B

Identify and rejects spoofing node LA, LB, LC, LD Location Claims of Node A,B,C,B respectively

Detection of Spoofing
Spoofing attack detection is performed using Cluster

Analysis

Existing System
Approaches to address potential spoofing attacks using

cryptographic schemes. The application of cryptographic schemes requires reliable key distribution, management, and maintenance mechanisms. Cryptographic methods are susceptible to node compromise.

Disadvantages
Due to the limited power and resources available to the

wireless devices and sensor nodes, it is not always possible to deploy authentication. If Authentication provided it ceases to a complex infrastructural overhead and computational power associated with distributing, and maintaining cryptographic keys. Increase the cost of implementation.

Proposed System
Incorporation of K-means spoofing detector into a real-time

indoor localization system. Spoofing detection system which can both detect the spoofing attacks, as well as localize the adversaries in wireless and sensor networks with physical properties associated This method utilizes the Received Signal Strength (RSS) which is measured across a set of access points which does not add any overhead to the wireless devices and sensor nodes By analyzing the RSS from each MAC address using K-means cluster algorithm, the distance between the centroids in signal space can be calculated for effective attack detection.

Advantages
Detect the presence of spoofing attacks
Determine the number of attackers Localize multiple adversaries

Improved accuracy while detecting the spoofing attackers.

Reference
Jie yang, Yingying chen,&Jerrry cheng Detection and

localization of multiple spoofing attackers in wireless networks-IEEE Jan 2013 F.Ferreri,M.Bernaschi,and L.Valcamonici Access point vulnerabilities to dos attacks in 802.11 networks Proc. IEEE WSN Conf., 2004. F.Guo and T.Chiueh Sequence number-based mac address spoof detection Proc. Eighth Intl Conf. Recent Advances in Intrusion Detection2006.

Thank You

You might also like