Identifying and Locating Multiple Spoofing Attackers Using Clustering in Wireless Network
International Journal of Wireless Communications and Mobile Computing
Volume 1, Issue 4, November 2013, Pages: 82-90
Received: Sep. 2, 2013; Published: Sep. 30, 2013
Views 3644      Downloads 323
Authors
AMALA GRACY, Department of Information Technology, RMK Engineering College, Anna University, Chennai, INDIA
CHINNAPPAN JAYAKUMAR, Department of Computer Science and Engineering, RMK Engineering College, Anna University, Chennai, INDIA
Article Tools
PDF
Follow on us
Abstract
Wireless networks are vulnerable to identity-based attacks, including spoofing attacks, significantly impact the performance of networks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via cryptographic authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management, coupled with additional infrastructural overhead and more extensive computations. The proposed non cryptographic mechanism which are complementary to authenticate and can detect device spoofing with little or no dependency on cryptographic keys. This generalized Spoofing attack-detection model utilizes MD5 (Message Digest 5) algorithm to generate unique identifier for each wireless nodes and a physical property associated with each node, as the basis for (1) detecting spoofing attacks; (2) finding the number of attackers when multiple adversaries masquerading as a same node identity; and localizing multiple adversaries. Cluster-based mechanisms are developed to determine the number of attackers. The proposed model can be explored further to improve the accuracy of determining the number of attackers, by using Support Vector Machines (SVM).
Keywords
Wireless Network, Spoofing Attack, Identity-Based Attack, Message Digest 5, Support Vector Machines, Partitioning Around Medoids (PAM) Cluster Model
To cite this article
AMALA GRACY, CHINNAPPAN JAYAKUMAR, Identifying and Locating Multiple Spoofing Attackers Using Clustering in Wireless Network, International Journal of Wireless Communications and Mobile Computing. Vol. 1, No. 4, 2013, pp. 82-90. doi: 10.11648/j.wcmc.20130104.11
References
[1]
Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng, "Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks", Proceedings of 28th Annual Joint Conference of the IEEE Computer and Communications Societies, 2009, pp. 666–674.
[2]
Wei Che, "Defending against TCP SYN Flooding Attacks under Different Types of IP Spoofing", Proceedings of International Conference on Mobile Communication, 2006, pp.38.
[3]
Diana Jeba Jingle, Elijah Blessing Rajsingh, "Defending IP Spoofing Attack and TCP SYN Flooding Attack in Next Generation Multi-hop Wireless Networks", International Journal of Information & Network Security, Volume 2, No.2, 2013, pp.160-166.
[4]
P.Ramesh Babu, S.D.Lalitha Bhaskari, CH. Satyanarayana, "A comprehensive Analysis of spoofing", International Journal of Advanced Computer Science and Application Volume 1, No.6, 2010.
[5]
Fanglu Guo and Tzi-cker Chiueh, "Sequence Number-Based MAC Address Spoof Detection", Proceedings of 8th International Symposium on Recent Advances in Intrusion Detection, 2005, pp.309-329.
[6]
Yingying Chen, Wade Trappe and Richard P. Martin, "Detecting and Localizing Wireless Spoofing Attacks", Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007, pp.193-202.
[7]
Jie Yang, Yingying Chen, Wade Trappe, "Detecting Spoofing Attacks in Mobile Wireless Environments", Proceedings of 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009, pp.107-189.
[8]
Jayakumar C and Chellappan C, "Quality of Service in Associativity based Mobility-Adaptive K-Clustering in Mobile Ad-hoc Networks", International Journal of The Computer, the Internet and Management, Vol.14, No.1, 2006, pp.61-80.
[9]
P. Infant Kingsly, C. Jayakumar, Mahendran Sadhasivam, S. Deepan Chakravarthy, "Smart Way for Secured Communication in Mobile Ad-hoc Networks", International Journal Computational Intelligence and Informatics, Vol.2 No. 1, 2012, pp.1-9.
[10]
Pelechrinis, K., Krishnamurthy, S.V., "Denial of Service Attacks in Wireless Networks: The Case of Jammers", IEEE Journal of Communications Surveys & Tutorials, Volume 13, Issue: 2, 2011, pp.245-257.
[11]
Qiang Liu, "Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networks", Proceedings of International Conference on Computing, Networking and Communications (ICNC), 2013, pp. 195-199.
[12]
Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures", Journal of Network and Computer Applications, Volume 35, Issue: 3, 2012, pp.867–880.
[13]
Koffka Khan, Wayne Goodridge & Diana Ragbir, "Security in Wireless Sensor Networks", Global Journal of Computer Science and Technology Network, Web & Security, Volume 12, Issue: 16, Version 1.0, 2012.
[14]
Divya Pal Singh, Pankaj Sharma and Ashish Kumar, "Detection of Spoofing attacks in Wireless network and their Remedies", International Journal of Research Review in Engineering Science and Technology, Volume 1, 2012, pp.1-5.
[15]
Jayakumar C and Chellappan C, "A QoS aware energy efficient routing protocol for wireless ad-hoc networks", Asian Journal of Information Technology, Vol.4, No.6, 2005, pp.578-582.
[16]
Karmel A and C. Jayakumar, "Analysis of MANET Routing Protocols Based on Traffic Type", IJREAT International Journal of Research in Engineering & Advanced Technology, Vol.1, Issue 1, 2013, pp.1-4.
[17]
K. Tan, Guanling Chen, D. Kotz, A Campbell, "Detecting 802.11 MAC layer spoofing using received signal strength", Proceedings of 27th Conference on Computer Communications, 2008, pp.1768-1776.
[18]
Iyad Aldasouqi and Walid Salameh, "Detecting and Localizing Wireless Network Attacks Techniques", International Journal of Computer Science and Security, Volume 4, No.1, 2010, pp.82-97.
[19]
Daniel B. Faria and David R. Cheriton, "Detecting identity-based attacks in wireless networks using Signal prints", Proceedings of 5th ACM Workshop on Wireless Security, 2006, pp.43-52.
[20]
Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng, "Detection and Localization of Multiple Spoofing Attackers in Wireless Networks", IEEE Transaction on Parallel and Distributed System, Volume 24, No.6, 2012, pp.44-58.
[21]
A. Wool, "Lightweight Key Management for IEEE 802.11 Wireless LANS with key refresh and host revocation", Journal of ACM/Springer Wireless Networks, Volume 11, 2005, pp.677–686.
[22]
Jayakumar C and Chellappan C, "Optimized on demand routing protocol of mobile adhoc network", Informatica, Vol.17, No. 4, 2006, pp.481-502.
[23]
M. Vijay Anand and C. Jayakumar, "Secure Routing in Manet Using Artificial Immune System Based on Danger Theory", International Journal of Emerging Research in Management &Technology, Vol.2, No.4, 2013, pp.73-77.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186