Detection and Localization of Attackers in Wireless Networks


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


The adaptability and openness of remote networks empower an opponent to take on the appearance of different devices effortlessly. Spoofing attacks are the one that causes serious network threats as they can encourage an assortment of progressed attacks to challenge the typical operation of systems. On the other hand, the existing approach can just locate spoofing attacks when the exploited person node and the spoofing node are static and thus the correlation problem occurs in the same frequency region. In this research, a method has been proposed for detecting and locating spoofing attacks in the mobile wireless environment and also to develop a Distance based Attack Localization and Detection (DALD) system, which is based on the distance of each packet while travelling from source to destination and where every node alert its neighbors, source and destination node that costs to reach them. It utilizes the Distance Vector Routing Protocols (DVRP) for successfully discovering the attack, and the number of attacks that discover and strike the area with a moderate network overhead. Through this simulation, it shows that DALD achieves identifying accurate attack, localization and detection.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Intrusion Detection Systems (IDS); Spoofing Attack; Localization; Distance Vector Routing Protocol

Full Text:

PDF


References


Y.Zhang and W.Lee,” Intrusion Detection in Wireless Ad-Hoc Networks”, Proceeding of 6th, ACM MOBICOM, pp. 275-283, 2000.

Kamal Deep Mekaetal, “Trust Based Routing Decisions in Mobile Ad Hoc Networks,” in Proceedings of The Second Secure Knowledge Management Workshop (SKM), 2006, National Science Foundation and the Polytechnic University, Brooklyn, NY

Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing-Related AnomalousTraffic in Ad Hoc Networks,” Proc. Ann. IEEEComm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks(SECON), 2006.

J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: RealVulnerabilities and Practical Solutions,” Proc. USENIX SecuritySymp., pp. 15-28, 2003.

F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access PointsVulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEEWireless Comm. and Networking Conf., vol.14 No.2,pp. 159-169, 2004.

D. Faria and D. Cheriton, “Detecting Identity-Based Attacks inWireless Networks Using Signalprints,” Proc. Of the 5th ACM WorkshopWireless Security (WiSe), pp.43-52 Sept. 2006.

Jie Yang ,Yingying (Jennifer) Chen, Wade Trappe, and Jerry Cheng “Detection and Localization of Multiple SpoofingAttackers in Wireless Networks”Proc IEEE transactions on parallel and distributed systems, vol. 24, no. 1, pp. 44-58, 2013

C. E Perkins and E. M. Royer, ”Ad-hoc On-Demand Distance Vector Routing,” Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp-90-100, February1999.

L. Layuan, Y.Peiyan and L.Chunlin, “Performance Evaluation andSimulations of Routing Protocols in Ad Hoc Networks” Computer Communications,vol.30, pp.1890-1998, 2007.

C.Perkin, Elizabeth M. Royer, “Ad hoc on demand Distance Vector Routing”, RFC 3561, July 2003, http.//www.ietf.org/rfc/rfc3561.txt.

L. Xiao, L.J. Greenstein, N.B. Mandayam, and W. Trappe, “Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 4646-4651, 2007.

F. Guo and T. Chiueh, “Sequence Number-Based MAC Address Spoof Detection,” Proc. Eighth Int’l Conf. Recent Advances in Intrusion Detection, pp. 309-329, 2006.

Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting802.11 MAC Layer Spoofing Using Received Signal Strength,”Proc. IEEE INFOCOM, Apr. 2008.

L. Sang and A. Arora, “Spatial Signatures for Lightweight Security in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 2137- 2145, 2008.

P. Bahl and V.N. Padmanabhan, “RADAR: An in-Building RFBased User Location and Tracking System,” Proc. IEEE INFOCOM,pp.775-784 vol.2, 2000.

E. Elnahrawy, X. Li, and R.P. Martin, “The Limits of Localization Using Signal Strength: A Comparative Study,” Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), pp.406-414, Oct. 2004.

Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, “A Practical Approach to Landmark Deployment for Indoor Localization,” Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), pp.365-373, Sept. 2006.

J. Yang and Y. Chen, “A Theoretical Analysis of Wireless Localization Using RF-Based Fingerprint Matching,” Proc. Fourth Int’l Workshop System Management Techniques, Processes, and Services (SMTPS), pp.1-6, Apr. 2008.

P. Enge and P. Misra, Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Press, 2001.

Z. Yang, E. Ekici, and D. Xuan, “A Localization-Based Anti-Sensor Network System,” Proc. IEEE INFOCOM, pp. 2396-2400, 2007.

Uma Nagar, Seema Nagar, R. S. Meena, Design of a Novel Compact Dualband Patch Antenna with Microstrip-Fed for Wireless Communication Bands, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (1), pp. 14-18.

Qammer H. Abbasi , M. M. Khan, S. Liaqat, M. Kamran, Yasir Saleem, A Novel Pathloss Model for Angular and Spatial Dependency of Ultra Wideband Off-Body Radio Channels, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 206-209.

Houriyeh Shadmehr, Francesco Grimaccia, Giambattista Gruosso, Marco Mussetta, Riccardo E. Zi, Optimized Antenna for Low UHF Range Wireless Power Transfer, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (1), pp. 21-26.

Abdullah Eroglu, Design of Wireless Data Acquisition Sensor System for Health Care Applications, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 386-391.

Said Ben Alla, Abdellah Ezzati, A Qos-Guaranteed Coverage and Connectivity Preservation Routing Protocol for Heterogeneous Wireless Sensor Networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.

Samiha Mekerta, Wide Band Power Amplifier for Wireless Applications, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (2), pp. 140-146.

Kumar, J., Kulkarni, M., Gupta, D., Performance comparison of MANET routing protocols, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 1-5.

Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.

Amnai, M., Fakhri, Y., Abouchabaka, J., Adaptive fuzzy mobility for delay and throughput sensitive traffic in Ad Hoc networks, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 965-971.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2022 Praise Worthy Prize