Title :
Prevention of Spoofing Attacks in Wireless Networks
Author :
Yadav, Arjunsingh Sushil ; Natu, Pooja Milind ; Sethia, Deshana Manoj ; Mundkar, Amruta Balaji ; Sambare, Santosh S.
Author_Institution :
Comput. Eng., Pimpri Chinchwad Coll. of Eng., Pune, India
Abstract :
Prevention of spoofing attacks is a hard problem. We propose a method of preventing the MAC Address spoofing attack. Here we will use an intermediate or dummy node which lies between the server and the users. This dummy node serves 2 purposes-1). Ignore the data requests by attackers 2). Reduce the traffic on the server. The detection of attackers is done by considering physical spatial information in the form of RSS (Received Signal Strength). Dividing the different users/nodes into clusters by using K-Means algorithm. Further the number of attackers are provided by GADE (Generalized Attack Detection Model) and attacker is detected and localized by IDOL (Integrated Detection & Localization System).
Keywords :
RSSI; access protocols; radio networks; telecommunication security; GADE; IDOL; MAC address spoofing attack; RSS; attacker detection; dummy node; generalized attack detection model; integrated detection & localization system; intermediate node; k-means algorithm; physical spatial information; received signal strength; wireless networks; Accuracy; Authentication; Dynamic scheduling; Heuristic algorithms; Resource management; Servers; Wireless networks; Intermediate Node; MAC Address; MAC Spoofing Attacks; Received Signal Strength (RSS);
Conference_Titel :
Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on
Conference_Location :
Pune
DOI :
10.1109/ICCUBEA.2015.37