Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Networks

Authors

  • Ankit Singh University of South Florida,Tampa and United States of America
  • Pallav Sinha Cognizant, Chennai and India
  • Soumyajyoti Bhattacharya IIT Kharagpur, Kharagpur and India

Keywords:

K-Means Clustering, Intrusion Detection System, Packet transmission, Networks, Cryptography.

Abstract

A Wireless sensor network consists of a series of sensing devices. These track parameters such as those required for tracking and surveillance and then effectively passes on this information with other such sensors over a specific geographical area within the wireless network. The problem with traditional wireless networks lies in the way that they are positioned in an unattended manner, being controlled remotely by the network operator. This opens up a pathway for attackers, which compromise and capture wireless nodes and launch a variety of attacks that impair the functioning of the system. The proposed system aims to localize and cluster these nodes together, according to their position, wherein the cluster head acts as an Intrusion Detection system by monitoring node behavior such as packet transmission. This information is used to identify the attacked nodes in the wireless sensor network.

References

Jie Yang, Yingying (Jennifer) Chen, Senior Member, IEEE, Wade Trappe and Jerry Cheng. (2013). Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IEEE. 24 (1), p44-58

M. Bohge and W. Trappe, “An Authentication Framework for Hierarchical Ad Hoc Sensor Networks,” Proc. ACM Workshop Wireless Security (WiSe), pp. 79-87, 2003.

A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.

B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Detecting and Localizing Wireless Spoofing Attacks” Proc. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 2014.

L. Xiao, L.J. Greenstein, N.B. Mandayam, and W. Trappe, “Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication,” Proc. IEEE Int’l Conf. Comm. (ICC), pp. 4646- 4651,June 2007.

V. Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless Device Identification with Radiometric Signatures,” Proc. 14th ACM Int’l Conf. Mobile Computing and Networking, pp. 116-127, 2008.

Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. And Networks (SECON), 2006.

F. Guo and T. Chiueh, “Sequence Number-Based MAC Address Spoof Detection,” Proc. Eighth Int’l Conf. Recent Advances in Intrusion Detection, pp. 309-329, 2006.

L. Sang and A. Arora, “Spatial Signatures for Lightweight Security in Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 21372145, 2008.

Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008.

D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006.

Y. Chen, J. Francisco, W. Trappe, and R.P. Martin, “A Practical Approach to Landmark Deployment for Indoor Localization,” Proc. IEEE Int’l Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Sept. 2006.

E. Elnahrawy, X. Li, and R.P. Martin, “The Limits of Localization Using Signal Strength: A Comparative Study,” Proc. IEEE Int’ Conf. Sensor and Ad Hoc Comm. and Networks (SECON), Oct. 2004.

P. Bahl and V.N. Padmanabhan, “RADAR: An in-Building RFBased User Location and Tracking System,” Proc. IEEE INFOCOM, 2000.

P. Enge and P. Misra, Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Press, 2001.

Downloads

Published

2017-10-07

How to Cite

Singh, A., Sinha, P., & Bhattacharya, S. (2017). Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Networks. International Journal of Computer (IJC), 27(1), 103–111. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/1076

Issue

Section

Articles