0% found this document useful (0 votes)
66 views12 pages

BY M.Loganathan Guided by Mrs - Alagumeenaakshi

This document proposes a system to detect spoofing attacks in wireless networks. The objectives are to detect the presence of spoofing attacks, determine the number of attackers, and localize multiple adversaries. It describes spoofing attacks and existing cryptographic approaches that have limitations. The proposed system incorporates a K-means spoofing detector into a real-time indoor localization system to analyze received signal strength from access points to detect and localize spoofing attackers without adding overhead to wireless devices. The advantages are improved accuracy in detecting and localizing multiple spoofing attackers.

Uploaded by

Sundar Rajadurai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views12 pages

BY M.Loganathan Guided by Mrs - Alagumeenaakshi

This document proposes a system to detect spoofing attacks in wireless networks. The objectives are to detect the presence of spoofing attacks, determine the number of attackers, and localize multiple adversaries. It describes spoofing attacks and existing cryptographic approaches that have limitations. The proposed system incorporates a K-means spoofing detector into a real-time indoor localization system to analyze received signal strength from access points to detect and localize spoofing attackers without adding overhead to wireless devices. The advantages are improved accuracy in detecting and localizing multiple spoofing attackers.

Uploaded by

Sundar Rajadurai
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 12

BY M.Loganathan GUIDED BY Mrs.

Alagumeenaakshi

Objective
To detect the presence of spoofing attacks.
Determine the number of attackers. Localize multiple adversaries.

Introduction
Highly distributed networks of small, lightweight wireless node,

-to monitor the environment or system.

Tempts targets for malicious attacks. Spoofing attacks -represent a form of identity compromise

and can facilitate a variety of traffic injection attacks, such as evil twin access point attacks. Desirable to detect the presence of spoofing and eliminate them from the network.

Spoofing
Spoofing attack is a situation in which one person or program

successfully masquerades as another by falsifying data and there by gaining an illegitimate advantage

SYSTEM ARCHITECTURE
Base Station
LA Node A LB Node B LC Node C LD Node B Node B

Identify and rejects spoofing node LA, LB, LC, LD Location Claims of Node A,B,C,B respectively

Detection of Spoofing
Spoofing attack detection is performed using Cluster

Analysis

Existing System
Approaches to address potential spoofing attacks using

cryptographic schemes. The application of cryptographic schemes requires reliable key distribution, management, and maintenance mechanisms. Cryptographic methods are susceptible to node compromise.

Disadvantages
Due to the limited power and resources available to the

wireless devices and sensor nodes, it is not always possible to deploy authentication. If Authentication provided it ceases to a complex infrastructural overhead and computational power associated with distributing, and maintaining cryptographic keys. Increase the cost of implementation.

Proposed System
Incorporation of K-means spoofing detector into a real-time

indoor localization system. Spoofing detection system which can both detect the spoofing attacks, as well as localize the adversaries in wireless and sensor networks with physical properties associated This method utilizes the Received Signal Strength (RSS) which is measured across a set of access points which does not add any overhead to the wireless devices and sensor nodes By analyzing the RSS from each MAC address using K-means cluster algorithm, the distance between the centroids in signal space can be calculated for effective attack detection.

Advantages
Detect the presence of spoofing attacks
Determine the number of attackers Localize multiple adversaries

Improved accuracy while detecting the spoofing attackers.

Reference
Jie yang, Yingying chen,&Jerrry cheng Detection and

localization of multiple spoofing attackers in wireless networks-IEEE Jan 2013 F.Ferreri,M.Bernaschi,and L.Valcamonici Access point vulnerabilities to dos attacks in 802.11 networks Proc. IEEE WSN Conf., 2004. F.Guo and T.Chiueh Sequence number-based mac address spoof detection Proc. Eighth Intl Conf. Recent Advances in Intrusion Detection2006.

Thank You

You might also like