SlideShare a Scribd company logo
 REAL TIME PROJECTS 
 IEEE BASED PROJECTS 
 EMBEDDED SYSTEMS 
 PAPER PUBLICATIONS 
 MATLAB PROJECTS 
 targetjsolutions@gmail.com 
 (0)9611582234, (0)9945657526 
Targetj Solutions - 9611582234
Targetj Solutions - 9611582234
 Wireless spoofing attacks are easy to launch and can 
significantly impact the performance of networks. Although 
the identity of a node can be verified through cryptographic 
authentication, conventional security approaches are not 
always desirable because of their overhead requirements. In 
this paper, we propose to use spatial information, a physical 
property associated with each node, hard to falsify, and not 
reliant on cryptography, as the basis for 1) detecting spoofing 
attacks; 2) determining the number of attackers when multiple 
adversaries masquerading as the same node identity; and 3) 
localizing multiple adversaries. We propose to use the spatial 
correlation of received signal strength (RSS) inherited from 
wireless nodes to detect the spoofing attacks. We then 
formulate the problem of determining the number of attackers 
as a multiclass detection problem. 
Targetj Solutions - 9611582234
CONTINUE…. 
Cluster-based mechanisms are developed to determine the 
number of attackers. When the training data are available, we 
explore using the Support Vector Machines (SVM) method to 
further improve the accuracy of determining the number of 
attackers. In addition, we developed an integrated detection 
and localization system that can localize the positions of 
multiple attackers. We evaluated our techniques through two 
testbeds using both an 802.11 (WiFi) network and an 
802.15.4 (ZigBee) network in two real office buildings. Our 
experimental results show that our proposed methods can 
achieve over 90 percent Hit Rate and Precision when 
determining the number of attackers. Our localization results 
using a representative set of algorithms provide strong 
evidence of high accuracy of localizing multiple adversaries. 
Targetj Solutions - 9611582234
 In the EXISTING SYSTEM, due to the open 
medium in Wireless Sensor Networks, spoofing attacks 
are easy to launch and can significantly impact the 
performance of networks. So that the nodes can be easily 
compromised and perform malicious activities. Although 
the identity of a node can be verified through 
cryptographic authentication, conventional security 
approaches are not always desirable because of their 
overhead requirements. 
DISADVANTGES: 
 Spoofing Attacks can be easily launched. 
 Nodes can be easily compromised and perform malicious 
activities. 
Targetj Solutions - 9611582234
 In the PROPOSED SYSTEM, we are 
implementing three steps 1. Detection of Spoofing 
attacks based on Received Signal Strength. 2. 
Determining the number of attackers when multiple 
adversaries masquerading the same node identity. So 
that we can identify the attackers who are all 
performing the spoofing attacks. 3. Localizing the 
multiple adversaries and eliminate them from the 
network if necessary. So that the other nodes may 
know about the attacker nodes in the Wireless Sensor 
Networks. 
Targetj Solutions - 9611582234
ADVANTAGES: 
 Easy to detect the spoofing attacks. 
 Eliminating the attacker node will provide more 
security to the network. 
 Encrypting the data packets restrict the intermediate 
nodes from viewing the original data. 
Targetj Solutions - 9611582234
SOFTWARE REQUIREMENTS: 
 Platform : Windows XP 
 Front End : Java JDK1.5. 
 Back End : MYSQL 
HARDWARE REQUIREMENTS: 
 Processor : Pentium IV 
 RAM : 512 MB 
 HDD : 80 GB 
Targetj Solutions - 9611582234
 In this work, we proposed to use received signal 
strength based spatial correlation, a physical property 
associated with each wireless device that is hard to falsify 
and not reliant on cryptography as the basis for detecting 
spoofing attacks in wireless networks. We provided 
theoretical analysis of using the spatial correlation of RSS 
inherited from wireless nodes for attack detection. We 
derived the test statistic based on the cluster analysis of 
RSS readings. Our approach can detect the presence of 
attacks as well as determine the number of adversaries, 
spoofing the same node identity, so that we can localize 
any number of attackers and eliminate them. Determining 
the number of adversaries is a particularly challenging 
problem. 
Targetj Solutions - 9611582234
 We developed SILENCE, a mechanism that employs 
the minimum distance testing in addition to cluster 
analysis to achieve better accuracy of determining the 
number of attackers than other methods under study, 
such as Silhouette Plot and System Evolution that use 
cluster analysis alone. Additionally, when the training 
data are available, we explored using Support Vector 
Machines-based mechanism to further improve the 
accuracy of determining the number of attackers 
present in the system. 
Targetj Solutions - 9611582234
 [1] J. Bellardo and S. Savage, “802.11 Denial-of-Service 
Attacks: Real Vulnerabilities and Practical Solutions,” 
Proc. USENIX Security Symp., pp. 15-28, 2003. 
 [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access 
Points Vulnerabilities to Dos Attacks in 802.11 Networks,” 
Proc. IEEE Wireless Comm. and Networking Conf., 2004. 
 [3] D. Faria and D. Cheriton, “Detecting Identity-Based 
Attacks in Wireless Networks Using Signalprints,” Proc. 
ACM Workshop Wireless Security (WiSe), Sept. 2006. 
 [4] Q. Li and W. Trappe, “Relationship-Based Detection of 
Spoofing- Related Anomalous Traffic in Ad Hoc 
Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and 
Sensor and Ad Hoc Comm. and Networks (SECON), 2006. 
Targetj Solutions - 9611582234
 [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, 
“Secure and Efficient Key Management in Mobile Ad 
Hoc Networks,” Proc. IEEE Int’l Parallel and 
Distributed Processing Symp. (IPDPS), 2005. 
 [6] A. Wool, “Lightweight Key Management for 
IEEE 802.11 Wireless Lans With Key Refresh and 
Host Revocation,” ACM/Springer Wireless Networks, 
vol. 11, no. 6, pp. 677-686, 2005. 
 [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. 
Campbell, “Detecting 802.11 MAC Layer Spoofing 
Using Received Signal Strength,” Proc. IEEE 
INFOCOM, Apr. 2008. 
Targetj Solutions - 9611582234

More Related Content

PDF
A030101001006
DOCX
A lightweight secure scheme for detecting
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
DOC
Lightweight secure scheme for detecting provenance forgery and packet drop at...
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
PDF
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
PDF
Enhancing the Security in WSN using Three Tier Security Architecture
A030101001006
A lightweight secure scheme for detecting
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Secure data aggregation technique for wireless sensor networks in the presenc...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Enhancing the Security in WSN using Three Tier Security Architecture

What's hot (17)

PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
PDF
A key management approach for wireless sensor networks
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
PDF
Dotnet detection and localization of multiple spoofing attackers in wireless...
PDF
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
PDF
N0704075079
PPTX
6. security in wireless sensor netwoks
PDF
Preparation gade and idol model for preventing multiple spoofing attackers in...
PDF
Robust encryption algorithm based sht in wireless sensor networks
PDF
Ii3415521555
PPTX
SPINS: Security Protocols for Sensor Networks
PPTX
Wireless sensor network security issues
PDF
A Survey on Cloud-Based IP Trace Back Framework
PDF
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
A key management approach for wireless sensor networks
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
Dotnet detection and localization of multiple spoofing attackers in wireless...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
N0704075079
6. security in wireless sensor netwoks
Preparation gade and idol model for preventing multiple spoofing attackers in...
Robust encryption algorithm based sht in wireless sensor networks
Ii3415521555
SPINS: Security Protocols for Sensor Networks
Wireless sensor network security issues
A Survey on Cloud-Based IP Trace Back Framework
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Ad

Similar to Detection and localization of multiple spoofing attacks in (20)

PDF
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
DOCX
Detection and localization of multiple spoofing attackers in wireless networks
PDF
IJSRED-V2I5P18
PDF
Ijcet 06 07_001
PDF
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
PDF
Detection of Spoofing attackers in wireless network
PDF
WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS
PDF
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
PDF
Position Recognition of Node Duplication Attacks in Wireless Network
PDF
IRJET - Security and Privacy by IDS System
PDF
Wireless lan intrusion detection by using statistical timing approach
PDF
Java detection and localization of multiple spoofing attackers in wireless n...
PDF
Java detection and localization of multiple spoofing attackers in wireless n...
PDF
Detection and localization of multiple spoofing attackers in wireless networks
PDF
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
PPTX
Ids presentation
PDF
Detection of suspected nodes in MANET
PDF
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Detection and localization of multiple spoofing attackers in wireless networks
IJSRED-V2I5P18
Ijcet 06 07_001
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
Detection of Spoofing attackers in wireless network
WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
Position Recognition of Node Duplication Attacks in Wireless Network
IRJET - Security and Privacy by IDS System
Wireless lan intrusion detection by using statistical timing approach
Java detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...
Detection and localization of multiple spoofing attackers in wireless networks
A wireless intrusion detection system and a new attack model (synopsis)
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
Ids presentation
Detection of suspected nodes in MANET
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
Ad

More from Finalyear Projects (17)

DOCX
Emotion recognition from facial expression using fuzzy logic
PPT
Energy efficient reverse skyline query processing over wireless sensor networks
PPT
Single sign on assistant an authentication brokers
PPT
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
PPT
Scalable scheduling of updates in streaming data warehouses
PPT
IEEE Projects 2014-2015
DOCX
A novel vlsi dht algorithm for a highly
DOCX
A novel vlsi dht algorithm for a highly
DOCX
Fpga implementation of truncated multiplier for array multiplication
DOCX
Keyword query routing
DOCX
Towards energy efficient big data gathering
DOC
Java ieee projects titles 2014 2015
DOCX
System proposal and crs model design applying
DOCX
Discovering emerging topics in social streams via link anomaly detection
DOC
Navigation by the soles of your feet
PPT
Android Mobile - Home Automation
PPT
Home automation
Emotion recognition from facial expression using fuzzy logic
Energy efficient reverse skyline query processing over wireless sensor networks
Single sign on assistant an authentication brokers
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
Scalable scheduling of updates in streaming data warehouses
IEEE Projects 2014-2015
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highly
Fpga implementation of truncated multiplier for array multiplication
Keyword query routing
Towards energy efficient big data gathering
Java ieee projects titles 2014 2015
System proposal and crs model design applying
Discovering emerging topics in social streams via link anomaly detection
Navigation by the soles of your feet
Android Mobile - Home Automation
Home automation

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
RMMM.pdf make it easy to upload and study
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
01-Introduction-to-Information-Management.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
O7-L3 Supply Chain Operations - ICLT Program
Insiders guide to clinical Medicine.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
RMMM.pdf make it easy to upload and study
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
01-Introduction-to-Information-Management.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
Microbial disease of the cardiovascular and lymphatic systems
Sports Quiz easy sports quiz sports quiz
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

Detection and localization of multiple spoofing attacks in

  • 1.  REAL TIME PROJECTS  IEEE BASED PROJECTS  EMBEDDED SYSTEMS  PAPER PUBLICATIONS  MATLAB PROJECTS  targetjsolutions@gmail.com  (0)9611582234, (0)9945657526 Targetj Solutions - 9611582234
  • 2. Targetj Solutions - 9611582234
  • 3.  Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Targetj Solutions - 9611582234
  • 4. CONTINUE…. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries. Targetj Solutions - 9611582234
  • 5.  In the EXISTING SYSTEM, due to the open medium in Wireless Sensor Networks, spoofing attacks are easy to launch and can significantly impact the performance of networks. So that the nodes can be easily compromised and perform malicious activities. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. DISADVANTGES:  Spoofing Attacks can be easily launched.  Nodes can be easily compromised and perform malicious activities. Targetj Solutions - 9611582234
  • 6.  In the PROPOSED SYSTEM, we are implementing three steps 1. Detection of Spoofing attacks based on Received Signal Strength. 2. Determining the number of attackers when multiple adversaries masquerading the same node identity. So that we can identify the attackers who are all performing the spoofing attacks. 3. Localizing the multiple adversaries and eliminate them from the network if necessary. So that the other nodes may know about the attacker nodes in the Wireless Sensor Networks. Targetj Solutions - 9611582234
  • 7. ADVANTAGES:  Easy to detect the spoofing attacks.  Eliminating the attacker node will provide more security to the network.  Encrypting the data packets restrict the intermediate nodes from viewing the original data. Targetj Solutions - 9611582234
  • 8. SOFTWARE REQUIREMENTS:  Platform : Windows XP  Front End : Java JDK1.5.  Back End : MYSQL HARDWARE REQUIREMENTS:  Processor : Pentium IV  RAM : 512 MB  HDD : 80 GB Targetj Solutions - 9611582234
  • 9.  In this work, we proposed to use received signal strength based spatial correlation, a physical property associated with each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in wireless networks. We provided theoretical analysis of using the spatial correlation of RSS inherited from wireless nodes for attack detection. We derived the test statistic based on the cluster analysis of RSS readings. Our approach can detect the presence of attacks as well as determine the number of adversaries, spoofing the same node identity, so that we can localize any number of attackers and eliminate them. Determining the number of adversaries is a particularly challenging problem. Targetj Solutions - 9611582234
  • 10.  We developed SILENCE, a mechanism that employs the minimum distance testing in addition to cluster analysis to achieve better accuracy of determining the number of attackers than other methods under study, such as Silhouette Plot and System Evolution that use cluster analysis alone. Additionally, when the training data are available, we explored using Support Vector Machines-based mechanism to further improve the accuracy of determining the number of attackers present in the system. Targetj Solutions - 9611582234
  • 11.  [1] J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. USENIX Security Symp., pp. 15-28, 2003.  [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004.  [3] D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006.  [4] Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006. Targetj Solutions - 9611582234
  • 12.  [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks,” Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005.  [6] A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.  [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008. Targetj Solutions - 9611582234