Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Enhanced Security Management through Detecting and Localizing Spoofing Adversaries in Network System

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 8
Year of Publication: 2014
Archana L. Shelar
Madhav D. Ingle

Archana L Shelar and Madhav D Ingle. Article: Enhanced Security Management through Detecting and Localizing Spoofing Adversaries in Network System. International Journal of Computer Applications 87(8):36-39, February 2014. Full text available. BibTeX

	author = {Archana L. Shelar and Madhav D. Ingle},
	title = {Article: Enhanced Security Management through Detecting and Localizing Spoofing Adversaries in Network System},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {8},
	pages = {36-39},
	month = {February},
	note = {Full text available}


Currently the Wireless Networks are used worldwide across the Globe. Such Wireless Networks are easily susceptible for variety of attacks. The variety of Spoofing attacks can also be easily launched in the wireless environment. Here this paper presents the new enhanced technique which makes use of the physical property mainly -RSS (The Received Signal Strength) associated with each node. It mainly focuses on RSS means the physical property instead of existing cryptographic techniques, which is hard or difficult to falsify and also independent of cryptographic techniques. This paper mainly focuses on ---Detecting Identity based spoofing attack, Determining number of attackers in the cluster network, Localizing and determining the actual position of attackers. Also this can further be used for Detecting Denial of Service attacks and Man in the Middle Attack. The experimental results show that this enhanced form doesn't require any additional efforts and also doesn't require extra modifications to the existing. Hence such things depict that this technique gives the enhanced security management as compared to the existing security techniques.


  • J. Bellardo and S. Savage, "802. 11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. USENIX Security Symp. pp. 15-28, 2003.
  • F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access Points Vulnerabilities to Dos Attacks in 802. 11 Networks," Proc. IEEE Wireless Comm. and Networking Conf. , 2004.
  • D. Faria and D. Cheriton, "Detecting Identity-Based Attacks in Wireless Networks Using Signalprints," Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006.
  • Q. Li and W. Trappe, "Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks," Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006.
  • B. Wu, J. Wu, E. Fernandez, and S. Magliveras, "Secure and Efficient Key Management in Mobile Ad Hoc Networks," Proc. IEEE Int'l Parallel and Distributed Processing Symp. (IP DPS), 2005.
  • A. Wool, "Lightweight Key Management for IEEE 802. 11 Wireless Lans with Key Refresh and Host Revocation," ACM /Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.
  • Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802. 11 MAC Layer Spoofing Using Received Signal Strength," Proc. IEEE INFOCOM, Apr. 2008.
  • L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 4646-4651, June 2007.
  • F. Guo and T. Chiueh, "Sequence Number-Based MAC Address Spoof Detection," Proc. Eighth Int'l Conf. Recent Advances in Intrusion Detection, pp. 309-329, 2006.
  • L. Sang and A. Arora, "Spatial Signatures for Lightweight Security in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 2137- 2145, 2008.
  • Y. Chen, J. Francisco, W. Trappe, and R. P. Martin, "A Practical Approach to Landmark Deployment for Indoor Localization,"Proc. IEEE Int'l Conf. Sensor and Ad Hoc Comm. and Networks. (SECON), Sept. 2006.
  • L. Kaufman and P. J. Rousseeuw, Finding Groups in Data: An Introduction to Cluster Analysis. Wiley Series in Probability and Statistics, 1990.
  • G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic, "Models and Solutions for Radio Irregularity in Wireless Sensor Networks,"ACM Trans. Sensor Networks, vol. 2, pp. 221-262, 2006.
  • C. van Rijsbergen, Information Retrieval, second ed. Butterworths, 1979.
  • P. Bahl and V. N. Padmanabhan, "RADAR: An in-Building RFBased User Location and Tracking System," Proc. IEEE INFOCOM, 2000.
  • E. Elnahrawy, X. Li, and R. P. Martin, "The Limits of Localization Using Signal Strength: A Comparative Study," Proc. IEEE Int'l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Oct. 2004.
  • P. Rousseeuw, "Silhouettes: A Graphical Aid to the Interpretation and Validation of Cluster Analysis," J. Computational and Applied Math. , vol. 20, no. 1, pp. 53-65, Nov. 1987.
  • K. Wang, "Estimating the Number of Clusters via System Evolution for Cluster Analysis of Gene Expression Data," Technical Report NO. 2007-258, Computer Science Dept. , Xidian Univ. , P. R. China, 2007.
  • D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A. S. Krishnakumar, "Bayesian Indoor Positioning Systems," Proc. IEEE INFOCOM, pp. 324-331, Mar. 2005.