Title :
Cluster-based mechanism for multiple spoofing attackers in WSN
Author :
Meena, T. ; Nishanthy, M. ; Kamalanaban, E.
Author_Institution :
Dept. of CSE, Vel Tech Univ., Chennai, India
Abstract :
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as asame node identity; and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as multiclass detection problem. Cluster based mechanisms is developed to determine the number of attackers. When the training data is available, we explore using Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two test beds using both an 802.11 (Wi-Fi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90% Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Keywords :
Zigbee; cryptography; support vector machines; telecommunication security; wireless LAN; wireless sensor networks; 802.11 network; 802.15.4 network; RSS; SVM method; WSN; Wi-Fi network; ZigBee network; attacker number determination; cluster-based mechanism; conventional security approach; cryptographic authentication; integrated detection-localization system; multiclass detection problem; multiple-adversary localization; multiple-attacker position localization; multiple-spoofing attackers; node identity; overhead requirement; physical property; real office buildings; received signal strength; spatial correlation; spatial information; spoofing attack detection; support vector machine method; wireless nodes; wireless spoofing attacks; Accuracy; Communication system security; Cryptography; Educational institutions; IEEE 802.11 Standards; Support vector machines; Wireless communication; Wireless network security; attack detection; localization; spoofing attack;
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
DOI :
10.1109/ICICES.2014.7034164