Analyzing Spoofing Attacks in Wireless Networks

@article{Jindal2014AnalyzingSA,
  title={Analyzing Spoofing Attacks in Wireless Networks},
  author={Keshav Jindal and Surjeet Dalal and Kamal Kumar Sharma},
  journal={2014 Fourth International Conference on Advanced Computing \& Communication Technologies},
  year={2014},
  pages={398-402}
}
Wireless Sensor Networks is a grouping of wireless networking and entrenched system technology that monitors the physical or environmental situation, such as temperature, sound, quivering, strain, motion or pollutant, at different locations and a spoofing attack is a one of the most common online attack in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage, it's become more sophisticated defense mechanisms. Various… 
Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering
  • Gaofeng An, T. Cho
  • International Journal of Computer Networks and Applications
  • 2021
Wireless Sensor Network (WSN), there are low capacity, low cost, tiny sensor nodes, and sinks. Sensor nodes detect an event occurring in its surroundings and send data about the event to the sink.
Efficient Physical Layer Spoofing Detection with an Autoregressive Model
TLDR
This paper proposes an efficient channel-based authentication rule to detect the presence of an illegal transmitter and concludes that a spoofing detection strategy can be developed using adjacent channel coefficients.
A Defense Mechanism Against Location Cheating Attack in Social Network
  • Qing Li, A. Ye, Li Xu
  • Computer Science
    2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)
  • 2017
TLDR
A mechanism is proposed to resist the attack by extracting the Access Point frames to construct corresponding AP tag and verifying the AP tag's consistency with its unpredictability, which can improve the robustness of terminal positioning.
Security and Privacy Issues in Wireless Networks and Mitigation Methods
TLDR
There are many ways these challenges can be mitigated, however, the lack of implementation of privacy and security solutions is still largely present due to the absence of practical application of these solutions by responsible parties in real world scenarios.
Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags
TLDR
A privacy attack model base on spoofing attack in MSNS is shown, and a novel defense mechanism based on WiFi-hotspot tags (i.e. base-station tags, BS tags) is proposed, which utilizes the unpredictability and reproducibility of BS tags to authenticate the spatial-temporal property of a geolocation.
SOAiCE: Simulation of Attacks in Cloud Computing Environment
  • V. Vishal, R. Johari
  • Computer Science
    2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
  • 2018
TLDR
Various network attacks such as Brute force attack and Dictionary attack have been discussed and demonstrated and this application is deployed on cloud for secure financial transaction over the internet.
Decision Forest Classifier with Flower Search Optimization Algorithm for Efficient Detection of BHP Flooding Attacks in Optical Burst Switching Network
TLDR
This research investigates the efficient feature selection by using a novel flower Pollination optimization algorithm (FPA) and the implementation of a Decision Forest algorithm by Penalizing Attributes (Forest PA) classifier for the detection of flooding attacks.
A Framework for End-Point Input Validation against Faults and Attacks in Big Data
A key challenge in big data collection process is input validation/filtering which is daunting due to untrustworthy input sources, especially with the “bring your own device” (BYOD) model. This paper
Multiband microstrip patch antenna with rectangular slots on patch for bluetooth and c-band applications
A Multiband Microstrip Patch Antenna with rectangular slots on patch is proposed for Bluetooth and C band applications. The proposed antenna is fabricated by etching rectangular patch of 0.192 0.2 
Sistemas embebidos en red seguros
espanolEl crecimiento y la expansion de las redes de sensores inalambricas inevitablemente amplian las posibilidades de los ciberdelincuentes de violar su seguridad. Aunque algunos de los riesgos de

References

SHOWING 1-10 OF 17 REFERENCES
Detecting Spoofing Attacks in Mobile Wireless Environments
  • J. Yang, Yingying Chen, W. Trappe
  • Computer Science
    2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
  • 2009
TLDR
The DEMOTE system is developed, which exploits Received Signal Strength (RSS) traces collected over time and achieves an optimal threshold to partition the RSS traces into classes for attack detection and its novel algorithm alignment prediction (ALP), when without the knowledge of spatial constraint of the wireless nodes, utilizes temporal constraints to predict the best RSS alignment of partitioned RSS classes for RSS trace reconstruction over time.
An Improved Method of Detecting Spoofed Attack in Wireless LAN
TLDR
This paper analyzes the possible reasons for generating false positive and false negative in Forge Resistance Relationship spoof detection method and proposed an improved method with reduced false alarms and comparison of detecting the anomalous packet between improved method and its parent Forge Resistance relationship method.
Detecting and Localizing Wireless Spoofing Attacks
TLDR
The results show that it is possible to detect wireless spoofing with both a high detection rate and a low false positive rate, thereby providing strong evidence of the effectiveness of the K-means spoofing detector as well as the attack localizer.
Non-cryptographic methods of MAC spoof detection in wireless LAN
TLDR
Some of the non cryptographic techniques to detect MAC spoofing along with their pros and cons and the network scenarios in which they can be used can help the wireless equipment manufacturers to implement intrusion detection systems capable of detecting MAC address spoofing efficiently.
Sensor network security issues at network layer
  • A. Habib
  • Computer Science
    2008 2nd International Conference on Advances in Space Technologies
  • 2008
This paper presents an overview of the various vulnerabilities in WSN at network layer, and the defensive measures that can be taken against these threats. Resource limitations in the Wireless Sensor
An Effective Method for Defense against IP Spoofing Attack
  • Yun-Ji Ma
  • Computer Science
    2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM)
  • 2010
TLDR
An effective method for defense against IP spoofing attack is proposed, which is based on traceroute and the cooperation with trusted adjacent nodes and demonstrates that the method can effectively and steadily detect the IP spoofed attack and thereby blocks it.
Modeling node capture attacks in wireless sensor networks
  • P. Tague, R. Poovendran
  • Computer Science
    2008 46th Annual Allerton Conference on Communication, Control, and Computing
  • 2008
TLDR
It is shown that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack.
A DES approach to intrusion detection system for ARP spoofing attacks
TLDR
This paper proposes a Discrete Event System (DES) approach for detecting ARP spoofing attacks, which does not require any extra constraint like static IP-MAC or changing the AR.
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks
TLDR
This paper proposes to use location information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks; and develops an integrated detection and localization system that can localize the positions of multiple attackers.
A survey on sensor networks
TLDR
The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
...
1
2
...