Wireless spoofing attacks is easy to launch and can impact the performance of networks. The identity of a node can be checked through cryptographic authentication, conventional security approaches are not always desirable because of their upstairs necessities. In this paper, we offer to use spatial information, a physical property associated with each node, hard to fake, and not reliant on cryptography, as the basis for (1) detecting parody attacks; (2) determining the number of assailants when numerous adversaries masquerading as a same node identity; and (3) localizing large adversaries. We suggest to use the longitudinal relationship of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then prepare the problem of regulating the number of attackers as a multi-class detection problem. Cluster-based mechanisms are created to determine the number of attackers. When the training data is available, we then added Support Vector Machines method to improve the accuracy of determining the number of attackers. we developed an racially mixed detection and localization system that can plot the positions of multiple attackers. We evaluated our techniques by two test beds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our submitted methods can achieve over 90% Hit Rate and Precision when determining the number of hackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of focusing numerous adversaries.
P. Kumar, G. Duraimurugan, G. Manoj Kumar, R. Logesh, L. MyvizhiPraveen
Zigbee, wireless nodes, Care Vector Technologies, MAC, Privacy Grid.
- J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proceedings of the USENIX Security Symposium, 2003, pp. 15 – 28.
- F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points vulnerabilities to dos attacks in 802.11 networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004.
- D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006.
- Q. Li and W. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,” in Proc. IEEE SECON, 2006.
- B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and efficient key management in mobile ad hoc networks,” in Proc. IEEE IPDPS, 2005.
- A. Wool, “Lightweight key management for ieee 802.11 wireless lans with key refresh and host revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677–686, 2005.
- Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proc. IEEE INFOCOM, April 2008.
- J. Yang, Y. Chen, and W. Trappe, “Detecting spoofing attacks in mobile wireless environments,” in Proc. IEEE SECON, 2009.
- Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proc. IEEE SECON, May 2007.
|Published in :
||Volume 2 | Issue 2 | March-April - 2016
|Date of Publication
Cite This Article
P. Kumar, G. Duraimurugan, G. Manoj Kumar, R. Logesh, L. MyvizhiPraveen, "Prevention and Localization of MAC Address Spoofing Attacks in Wireless Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.181-185, March-April-2016.
URL : http://ijsrset.com/IJSRSET162251.php