Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

Pesticides Induced Alternations in Plant Growth Hormone (IAA) in RHIZOBACTERIA

Four pesticides Endosulfan, Lambda cyhalothrin, Monocrotophos and Macnozeb were applied at recommended and higher rates to examine their effects on the plant growth promoting activities of the pesticides tolerant Pseudo...

Automated Sensor Network for Monitoring and Detection of Impurity in Drinking Water System

This paper describes a low cost and holistic approach to the water quality monitoring problem for drinking water distribution systems as well as for consumer sites. Our approach is to develop sensor nodes for real time...

Evaluation of Electrical and Mechanical Properties of Particulate Filled Natural Fiber Reinforced Vinyl ester Composites

Globally natural fiber based structured polymer composite materials are emerging material of various disciplinary. In general the natural fiber composites are low cost, no health hazard, electrical insulation, good mech...

A Low Power Discrete Time 2nd order Band-pass Sigma Delta Modulator For Wireless LAN Receiver

Sigma delta modulators are the most suitable ADC topologies for digitizing with high resolution analog signals. Band pass sigma-delta modulators have recently received great attention in the academia as well as in the i...

Growth And Characterization of ADP With β- Alanine Single Crystals

In Semi Organic crystal, ADP with β-Alanine was grown by slow evaporation method at room temperature. The characterization of Powder X-ray diffraction and spectroscopic studies of FT-IR, UV-Visible Spectra and AC Impeda...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 267
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://www.europub.co.uk/articles/-A-19604