DocumentCode :
1906475
Title :
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks
Author :
Yang, Jie ; Chen, Yingying ; Trappe, Wade ; Cheng, Jerry
Author_Institution :
Dept. of ECE, Stevens Inst. of Technol., Hoboken, NJ
fYear :
2009
fDate :
19-25 April 2009
Firstpage :
666
Lastpage :
674
Abstract :
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use location information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for (1) detecting spoofing attacks; (2) determining the number of attackers when multiple adversaries masquerading as a same node identity; and (3) localizing multiple adversaries. We formulate the problem of determining the number of attackers as a multi-class detection problem. We first propose two cluster-based mechanisms to determine the number of attackers. We then develop SILENCE that employs the minimum distance testing of RSS values in addition to cluster analysis and can achieve better accuracy than other methods under study that merely use cluster analysis alone. We further developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that SILENCE can achieve over 90% Hit Rate and Precision when determining the number of attackers. Additionally, our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Keywords :
cryptography; pattern clustering; radio networks; telecommunication security; WiFi network; ZigBee network; cluster analysis; cryptographic authentication; localization system; multiclass detection problem; wireless spoofing attacks; Collaboration; Communications Society; Computer crime; Costs; Cryptography; Peer to peer computing; Signal analysis; Signal detection; Statistics; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM 2009, IEEE
Conference_Location :
Rio de Janeiro
ISSN :
0743-166X
Print_ISBN :
978-1-4244-3512-8
Electronic_ISBN :
0743-166X
Type :
conf
DOI :
10.1109/INFCOM.2009.5061974
Filename :
5061974
Link To Document :
بازگشت