Loading...

Proceedings of

3rd International Conference on Advances in Computing, Electronics and Communication ACEC 2015

"DETECTING AND FOCALIZING SPOOFING ATTACKS IN WIRELESS NETWORKS"

NEELAVATHY PARI S NEELAVATHY PARI S SIVA KUMAR G R
DOI
10.15224/978-1-63248-064-4-25
Pages
121 - 126
Authors
3
ISBN
978-1-63248-064-4

Abstract: “An important problem in wireless network security is node authentication. The existing schemes for node authentication are based on IP and MAC address which can be easily spoofed by the adversaries. Wireless spoofing attacks are easy to establish and significantly affects the functionality of the network. In the proposed approach, log files are used for authenticating each node which is hard to falsify and difficult to modify or delete the contents. The proposed system determines the spoofing attacks and localize the adversaries using spatial correlation of received signal strength (RSS). In this paper, the problem of identifying the number of attackers is determined by Partitioning Around Mediods (PAM), a cluster-based analysis method and Euclidean distance between successive packets. The simulation results show that the proposed approach over performs all other existing approaches with high detection ratio”

Keywords: Spoofing attacks, RSS, PAM, Euclidean distance.

Download PDF