Analyzing Spoofing Attacks in Wireless Networks

@article{Jindal2014AnalyzingSA,
  title={Analyzing Spoofing Attacks in Wireless Networks},
  author={Keshav Jindal and Surjeet Dalal and Kamal Kumar Sharma},
  journal={2014 Fourth International Conference on Advanced Computing \& Communication Technologies},
  year={2014},
  pages={398-402}
}
Wireless Sensor Networks is a grouping of wireless networking and entrenched system technology that monitors the physical or environmental situation, such as temperature, sound, quivering, strain, motion or pollutant, at different locations and a spoofing attack is a one of the most common online attack in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage, it's become more sophisticated defense mechanisms. Various… 

Tables from this paper

Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering

  • Gaofeng AnT. Cho
  • Computer Science
    International Journal of Computer Networks and Applications
  • 2021
The hop count and the encrypted node ID are added in the report generation process of the statistical en-route filtering technique to detect wormhole attacks even when a wormhole attack occurs along with a false report injection attack to improve security.

Efficient Physical Layer Spoofing Detection with an Autoregressive Model

This paper proposes an efficient channel-based authentication rule to detect the presence of an illegal transmitter and concludes that a spoofing detection strategy can be developed using adjacent channel coefficients.

Development of a Model for Spoofing Attacks in Internet of Things

An algorithm is proposed for detecting spoofing attacks in IoT using Received Signal Strength (RSS) and Number of Connected Neighbors (NCN) and the result is that the proposed model increases the detection and prevention of spoofing.

A Defense Mechanism Against Location Cheating Attack in Social Network

  • Qing LiAyong YeLi Xu
  • Computer Science
    2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)
  • 2017
A mechanism is proposed to resist the attack by extracting the Access Point frames to construct corresponding AP tag and verifying the AP tag's consistency with its unpredictability, which can improve the robustness of terminal positioning.

FakeAP Detector: An Android-Based Client-Side Application for Detecting Wi-Fi Hotspot Spoofing

This paper presents an Android-based client-side solution to detect the presence of fake access points in a perimeter using details collected from probe responses, and it is developed for portability and better performance.

Security and Privacy Issues in Wireless Networks and Mitigation Methods

There are many ways these challenges can be mitigated, however, the lack of implementation of privacy and security solutions is still largely present due to the absence of practical application of these solutions by responsible parties in real world scenarios.

Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags

A privacy attack model base on spoofing attack in MSNS is shown, and a novel defense mechanism based on WiFi-hotspot tags (i.e. base-station tags, BS tags) is proposed, which utilizes the unpredictability and reproducibility of BS tags to authenticate the spatial-temporal property of a geolocation.

SOAiCE: Simulation of Attacks in Cloud Computing Environment

  • V. VishalR. Johari
  • Computer Science
    2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
  • 2018
Various network attacks such as Brute force attack and Dictionary attack have been discussed and demonstrated and this application is deployed on cloud for secure financial transaction over the internet.

Digital Forensic Analysis on Caller ID Spoofing Attack

This research aims to determine the artifacts resulting from caller ID spoofing attacks to assist in mapping and finding digital evidence.

Reduction of broadcast storm in urban VANETs using network science

This paper studies various network parameters of VANETs like node degree distribution, clustering coefficient, average shortest path length, network reachability, mobility pattern, road topology, penetration rate and network overhead, and shows how this information can be used to reduce communication overhead in urban vehicular broadcasting protocol (UVCAST) with no major reduction in performance of existing protocol.

References

SHOWING 1-10 OF 17 REFERENCES

Detecting Spoofing Attacks in Mobile Wireless Environments

  • J. YangYingying ChenW. Trappe
  • Computer Science
    2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
  • 2009
The DEMOTE system is developed, which exploits Received Signal Strength (RSS) traces collected over time and achieves an optimal threshold to partition the RSS traces into classes for attack detection and its novel algorithm alignment prediction (ALP), when without the knowledge of spatial constraint of the wireless nodes, utilizes temporal constraints to predict the best RSS alignment of partitioned RSS classes for RSS trace reconstruction over time.

An Improved Method of Detecting Spoofed Attack in Wireless LAN

This paper analyzes the possible reasons for generating false positive and false negative in Forge Resistance Relationship spoof detection method and proposed an improved method with reduced false alarms and comparison of detecting the anomalous packet between improved method and its parent Forge Resistance relationship method.

Detecting and Localizing Wireless Spoofing Attacks

The results show that it is possible to detect wireless spoofing with both a high detection rate and a low false positive rate, thereby providing strong evidence of the effectiveness of the K-means spoofing detector as well as the attack localizer.

Non-cryptographic methods of MAC spoof detection in wireless LAN

Some of the non cryptographic techniques to detect MAC spoofing along with their pros and cons and the network scenarios in which they can be used can help the wireless equipment manufacturers to implement intrusion detection systems capable of detecting MAC address spoofing efficiently.

Sensor network security issues at network layer

  • A. Habib
  • Computer Science
    2008 2nd International Conference on Advances in Space Technologies
  • 2008
This paper presents an overview of the various vulnerabilities in WSN at network layer, and the defensive measures that can be taken against these threats. Resource limitations in the Wireless Sensor

An Effective Method for Defense against IP Spoofing Attack

  • Yun-Ji Ma
  • Computer Science
    2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM)
  • 2010
An effective method for defense against IP spoofing attack is proposed, which is based on traceroute and the cooperation with trusted adjacent nodes and demonstrates that the method can effectively and steadily detect the IP spoofed attack and thereby blocks it.

Modeling node capture attacks in wireless sensor networks

  • P. TagueR. Poovendran
  • Computer Science
    2008 46th Annual Allerton Conference on Communication, Control, and Computing
  • 2008
It is shown that the goals of node capture attacks can be decomposed into a collection of primitive events, the impact of which can be evaluated and recombined to yield an overall evaluation of the attack.

A DES approach to intrusion detection system for ARP spoofing attacks

This paper proposes a Discrete Event System (DES) approach for detecting ARP spoofing attacks, which does not require any extra constraint like static IP-MAC or changing the AR.

Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks

This paper proposes to use location information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks; and develops an integrated detection and localization system that can localize the positions of multiple attackers.

A survey on sensor networks

The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.