Professional Documents
Culture Documents
BY M.Loganathan Guided by Mrs - Alagumeenaakshi
BY M.Loganathan Guided by Mrs - Alagumeenaakshi
BY M.Loganathan Guided by Mrs - Alagumeenaakshi
Alagumeenaakshi
Objective
To detect the presence of spoofing attacks.
Determine the number of attackers. Localize multiple adversaries.
Introduction
Highly distributed networks of small, lightweight wireless node,
Tempts targets for malicious attacks. Spoofing attacks -represent a form of identity compromise
and can facilitate a variety of traffic injection attacks, such as evil twin access point attacks. Desirable to detect the presence of spoofing and eliminate them from the network.
Spoofing
Spoofing attack is a situation in which one person or program
successfully masquerades as another by falsifying data and there by gaining an illegitimate advantage
SYSTEM ARCHITECTURE
Base Station
LA Node A LB Node B LC Node C LD Node B Node B
Identify and rejects spoofing node LA, LB, LC, LD Location Claims of Node A,B,C,B respectively
Detection of Spoofing
Spoofing attack detection is performed using Cluster
Analysis
Existing System
Approaches to address potential spoofing attacks using
cryptographic schemes. The application of cryptographic schemes requires reliable key distribution, management, and maintenance mechanisms. Cryptographic methods are susceptible to node compromise.
Disadvantages
Due to the limited power and resources available to the
wireless devices and sensor nodes, it is not always possible to deploy authentication. If Authentication provided it ceases to a complex infrastructural overhead and computational power associated with distributing, and maintaining cryptographic keys. Increase the cost of implementation.
Proposed System
Incorporation of K-means spoofing detector into a real-time
indoor localization system. Spoofing detection system which can both detect the spoofing attacks, as well as localize the adversaries in wireless and sensor networks with physical properties associated This method utilizes the Received Signal Strength (RSS) which is measured across a set of access points which does not add any overhead to the wireless devices and sensor nodes By analyzing the RSS from each MAC address using K-means cluster algorithm, the distance between the centroids in signal space can be calculated for effective attack detection.
Advantages
Detect the presence of spoofing attacks
Determine the number of attackers Localize multiple adversaries
Reference
Jie yang, Yingying chen,&Jerrry cheng Detection and
localization of multiple spoofing attackers in wireless networks-IEEE Jan 2013 F.Ferreri,M.Bernaschi,and L.Valcamonici Access point vulnerabilities to dos attacks in 802.11 networks Proc. IEEE WSN Conf., 2004. F.Guo and T.Chiueh Sequence number-based mac address spoof detection Proc. Eighth Intl Conf. Recent Advances in Intrusion Detection2006.
Thank You