CFP last date
20 May 2024
Reseach Article

Analysis of Detection of Multiple Attackers in Wireless Networks

by Pornima K. Girwalkar, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 11
Year of Publication: 2013
Authors: Pornima K. Girwalkar, B. M. Patil
10.5120/13534-1180

Pornima K. Girwalkar, B. M. Patil . Analysis of Detection of Multiple Attackers in Wireless Networks. International Journal of Computer Applications. 78, 11 ( September 2013), 23-29. DOI=10.5120/13534-1180

@article{ 10.5120/13534-1180,
author = { Pornima K. Girwalkar, B. M. Patil },
title = { Analysis of Detection of Multiple Attackers in Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 11 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number11/13534-1180/ },
doi = { 10.5120/13534-1180 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:18.691386+05:30
%A Pornima K. Girwalkar
%A B. M. Patil
%T Analysis of Detection of Multiple Attackers in Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 11
%P 23-29
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks are usually deployed in hostile environment where an adversary can masquerade some internal nodes which may launch various inside attacks which may leads to reduction in network performance. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper one method is used based on spatial correlation of Received signal strength of each node to find out the presence of attack and a cluster based mechanism is used to find out number of attackers. An efficiency based RADAR gridded algorithm is used further to localize the no of attackers in the network. Experimental evaluation is carried out using two test simulations of IEEE 802. 11 and Zigbee networks. The comparison shows that the packet overheads are lesser as compared to other schemes. It has been observed that packet delivery ratio and end to end delay increases as increase number of nodes while energy decreases with optimal point.

References
  1. S. Pandey And P. Agrawal," A Survey On Localization Techniques For Wireless Networks", Journal Of The Chinese Institute Of Engineers, Vol. 29, No. 7, Pp. 1125-1148 (2006).
  2. J. Yang and Y. Chen," Determining The Number Of Attackers And Localizing Multiple Adversaries In Wireless Spoofing Attacks", IEEE INFOCOM 2009.
  3. B. Wu, J. Wu, E. Fernandez and S. Magliveras, "Secure and Efficient Key Management in Mobile Ad Hoc Networks," In Proc. IEEE IPDPS, 2005.
  4. M. Bohge and W. Trappe, "An Authentication Framework For Hierarchical Ad Hoc Sensor Networks," In Proc. ACM Workshop on Wireless Security (WiSe), 2003, pp. 79–87.
  5. D. Faria and D. Cheriton, "Detecting Identity-Based Attacks In Wireless Networks Using Singal-Prints," In Proc. ACM Workshop on Wireless Security, Sept. 2006, pp. 43–52.
  6. F. Guo and T. Chiueh, "Sequence Number-Based MAC Address Spoof Detection," In Proc. 8th International Symposium on Recent Advances in Intrusion Detection, Seattle, WA, USA, Sept. 2005.
  7. D. Madory, "New Methods Of Spoof Detection In 802. 11b Wireless Networks," Hanover, NH: M. Eng. Thesis, Dartmouth College, 2006.
  8. Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802. 11 MAC layer spoofing using received signal strength," in Proc. IEEE INFOCOM, April 2008.
  9. Y. Chen, J. Francisco, W. Trappe, and R. Martin, "A Practical Approach To Landmark Deployment For Indoor Localization," In Proc. IEEE SECON, September 2006.
  10. A. Goldsmith, "Wireless Communications: Principles and Practice," New York, NY, USA: Cambridge University Press, 2005.
  11. M. Abramowitz and I. Stegun, "Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables", New York: Courier Dover, 1965.
  12. P. Bahl and V. Padmanabhan, "RADAR: An In-Building RF-Based User Location and Tracking System," In Proc. IEEE INFOCOM, 2000.
  13. G. Chandrasekaran, M. Ergin and J. Yang, "Empirical Evaluation of the Limits on Localization Using Signal Strength" WINLAB, Rutgers University,available:http://citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 157. 9222.
  14. P. Rousseeuw, "Silhouettes: A Graphical Aid To The Interpretation And Validation Of Cluster Analysis," Journal of Computational and Applied Mathematics, vol. 20, no. 1, pp. 53–65, November 1987.
  15. K. Wang, "Estimating The Number Of Clusters Via System Evolution For Cluster Analysis Of Gene Expression Data," Technical Report NO. 2007-258, Computer Science Department, Xidian University, P. R. China, 2007
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Security Attack Detection RSS value Localization