Full Paper

ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS
AND TECHNOLOGIES
(ICRACST’15)
TH
25 MARCH 2015
IWA: IDENTIFYING NUMEROUS WANGLING
ATTACKERS IN WIRELESS NETWORKS
Hema M
Natchadalingam R
ME CSE, PSN Engineering College, Tirunelveli,
Tamilnadu, India
Professor Dept of CSE, PSN Engineering College,
Tirunelveli, Tamilnadu, India
Abstract: Wireless wangling attacks are easy to
commonly available platforms to launch a variety
of attacks with tiny effort. According various types of
attacks, identity-based wangling attacks are
especially easy to launch and can cause significant
damage to network. Wangling attacks can further
facilitate a variety of traffic injection attacks [2], [3],
such as attacks on access control lists, scoundrel
access point attacks, and eventually Denial-ofService (DoS) attacks. A broad survey of possible
wangling attacks can be found in [4], [5]. Moreover,
in a large-scale network, numerous antagonists may
masquerade as the same identity and collaborate to
launch malicious attacks such as network resource
utilization attack and denial-of-service attack quickly.
start on and can significantly impact the
performance of networks .This paper proposes to
use spatial information, a substantial property
associated with every node, hard to fake .and not
dependent on cryptography, as the basis for
1.identifying wangling attacks; 2.establishing the
number of attackers when numerous antagonists
hidden as a same node identity: 3.deliberate
diverse antagonists. The spatial correlation of
received signal strength inherited from wireless
nodes are used to identifying the wangling attacks.
Then the problem of determining the number of
attackers as multiclass finding problem is
formulated.
Cluster-based
mechanism
is
developed to start the number of attackers. if the
instruction data is available, Support Vector
Machines (SVM) method is used to further
improve the accuracy of determining the number
of attackers and also integrated identification and
position system is used concentrate the positions of
numerous attackers.
Keywords: Wireless network security, wangling
attack, attack identification
I. INTRODUCTION
In wireless networks the openness of
transmission medium, attackers can observe any
transmission. Further, these attackers can easily
purchase low-cost wireless devices and use these
Therefore, it is important to



Identifying the presence of wangling attacks,
Establish the number of attackers, and
Concentrate numerous antagonists and
eliminate them.
Most
existing
approaches
employ
cryptographic schemes to address probable wangling
attacks [7], [6].However, the
application
of
cryptographic schemes requires reliable key
delivery
management,
and
continuation
mechanisms. It is not always enviable to apply
these cryptographic methods because of its
computational , infrastructural ,and management
transparency. Advance cryptographic methods are
liable to node negotiation, which is a severe concern
as most wireless nodes are without problems
available, allowing their memory to be without
problems scanned. This paper proposes to use RSS-
32
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS
AND TECHNOLOGIES
(ICRACST’15)
TH
25 MARCH 2015
based spatial correlation, a substantial property
associated with each wireless node that is hard to
fake and not dependent on cryptography as the basis
for identifying wangling attacks. Since the concern is
on the attackers who have different locations than
legitimate wireless nodes, utilizing spatial in
sequence to address wangling attacks has the unique
power to not only identify the presence of these
attacks but also concentrate antagonists An added
advantage of employing spatial correlation to
identifying wangling attacks is that it will not
require any additional cost or modification to the
wireless devices themselves.
The focal point is on static nodes in this
work, which are frequent for wangling scenario [8].
The works that are strongly connected are [4], [8],
[10]. [4] Proposed the use of matching rules of signal
print for wangling exposure [8] model the RSS
readings using a Gaussian mixture model and [10]
used RSS and K-means cluster analysis to identifying
wangling attacks. However, none of these approaches
have the ability to establish the number of attackers
when numerous antagonists use a same identity to
launch attacks, which is the basis to further
concentrate numerous antagonists after attack
detection. Although [10] studied how to
Concentrate antagonists , it can only handle the
case of a single wangling attacker and cannot
Concentrate the attacker if the adversary uses
different transmission power levels.
The main aid of the work are:


GAIE : a generalized attack identification
model that can both identifying wangling
attacks as well as establish the number of
antagonists using cluster analysis methods
grounded on RSS-based spatial correlations
among normal devices and antagonists
IIPS: an integrated identification and
position system that can both identifying
attacks as well as find the positions of
numerous antagonists
even when the
antagonists vary their transmission power
levels.
In GAIE, the Partitioning Around Medoids
(PAM) cluster analysis method is used to perform
attack detection. The problem of determining the
number of attackers as a multi-class detection
problem is formulated. Then cluster based methods
are applied to establish the number of attacker. IIPS
mechanism to make existing minimum reserve of
clusters, to progress the exactness of seminal the
number of attackers. Additionally, if the instruction
data is available, Support Vector Machines (SVM)
method is used to further improve the accuracy
of establishing the number of attackers. Moreover,
an integrated system, IIPS, is used which utilizes the
results of the number of attackers returned by GAIE
to further Concentrate numerous antagonists
The rest of this paper is prepared as follows.
In Section II, the related work is review; Overview of
the techniques is presented in Section III. The future
scheme is described in Section IV. In Section V,
algorithm is conducted. Section VI provides
performance analysis of the proposed scheme. We
conclude in Section VII.
II. RELATED WORK
The traditional approach to prevent
wangling attacks is to use cryptographic-based
authentication [7],[6], [11]. Wu et al. [7] have
introduced a secure and efficient key management
(SEKM) framework. It build a Public Key
Infrastructure (PKI) by applying a secret sharing
scheme and an underlying multicast server group.
Wool [7]implemented
a
key
management
mechanism with periodic key refresh and host
revocation
to
prevent
the compromise of
authentication keys.
In wireless networks new approaches
utilizing substantial properties associated with
wireless broadcast to contest attacks have been
proposed. Based on the fact that wireless control
response decelerates quite quickly in space, a
33
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS
AND TECHNOLOGIES
(ICRACST’15)
TH
25 MARCH 2015
channel-based confirmation scheme was proposed
to discriminate between transmitters at different
locations, and thus to identifying wangling attacks
in wireless networks [12].Brik et al. [13] focused
on construction fingerprints of 802.11bWLAN
Network Interface Card by dig out radiometric
signature, such as frequency extent phase errors,
and I/Q derivation offset, to defend against
identity attacks. However, there is further
transparency associated with wireless channel
response and radiometric signature extraction in
wireless networks. Li and Trappe [6] introduced a
security
layer
that
used
forge-resistant
relationships based on the package interchange,
including MAC progression number and traffic
pattern, to identify wangling attack. The MAC
sequence number has also been used in [14] to
perform wangling detection. Both the sequence
number and the traffic pattern can be
manipulated by an adversary as long as the
adversary learns the traffic pattern under normal
conditions.
with ranging method, range-based algorithms
involve distance estimation to landmarks using the
measurement of various substantial properties
such as RSS [16], [15], Time Of Arrival (TOA)
, Time Difference Of Arrival (TDOA), and route of
arrival (DoA). Whereas range-free algorithms use
coarser metrics to place limits on candidate positions.
one more method of classification describes the
strategy used to map a node to a position Lateration
approach use detachment to landmark, if angulations
uses the angles from landmarks. Scene matching
strategies [16] use a function that maps observed
radio properties to locations on a pre constructed
signal map or database and additional, Chen
proposed to perform detection of attacks on wireless
positioning and Yang proposed to use the direction of
arrival and received signal strength of the signals to
concentrate enemy’s sensor nodes and also we
choose a group of algorithms employing RSS to
perform the task of concentrate numerous attackers
and evaluate their performance in terms of
positioning accuracy
The works [4], [8], [15] using RSS to defend
against WANGLING attacks are most closely related
to us. Faria and Cheriton [4] proposed the use of
matching rules of signalprints for wangling detection.
Sheng et al. [8] modelled the RSS readings using a
Gaussian mixture model. Sang and Arora [15]
proposed to use the node’s “spatial given name”
including Received Signal Strength Indicator
(RSSI)and Link Quality Indicator (LQI) to confirm
messages in wireless network. However, not any of
these approaches are talented of determining the
number of attackers when there are numerous
antagonists collaborating to use the same identity to
launch spiteful attack and additional they do not have
the ability to concentrate the positions of the
antagonists after attack detection
This work differs from the previous study in
that here the spatial information is used to assist in
attack detection instead of relying on cryptographicbased approaches and moreover, this work is novel
because none of the exiting work can establish the
number of attackers when there are numerous
antagonists masquerading as the same uniqueness.
furthermore
this
approach
can
accurately
Concentrate numerous antagonists even when the
attackers varying their transmission power levels to
trick the system of their true locations.
Turning to studying identifying techniques,
in spite of its several meter-level exactness, using
RSS [16], [15], is an attractive approach because it
can reuse the existing wireless infrastructure and is
highly correlated with substantial location. Dealing
III. OVERVIEW OF TECHNIQUES
(1)Generalized attack identifation model
Generalized Attack Identification Model
(GAIE) consists of two phases: attack finding, which
finds the presence of an attack, and number purpose,
which establishes the number of antagonists.
(2) Formative the number of attackers
34
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN COMMUNICATION SYSTEMS
AND TECHNOLOGIES
(ICRACST’15)
TH
25 MARCH 2015
Inaccurate estimation of the number of
attackers will cause failure in concentrate the
numerous antagonists. Since it is not known that how
many antagonists will use the same node identity to
launch attacks, formative the number of attackers
becomes a multi-class finding problem and is similar
to determining how many clusters exist in the RSS
readings.
3.
4.
5.
(3) IIPS:
Integrated identification and position
system integrated systems that can identifying
wangling attacks, establish the number of
attackers, and concentrate numerous antagonists .
6.
The number of attackers: The estimation of
the number attackers will cause failure in the
same node identity
Attacker number determination: The system
uses the twin cluster model, that can use
energy calculation
IIPS mechanism: The system can
identifying wangling attacks, establish the
number of attackers. that employs the
minimum distance testing in addition to
cluster analysis to achieve better accuracy of
determining the number of attackers
SVM mechanism: used to further improve
the accuracy of determining the number of
attackers present in the system.
IV. PROPOSED SYSTEM
The proposed system uses received signal
strength (RSS)-based spatial correlation, a
extensive property associated with each wireless
node that is hard to fake and not dependent on
cryptography as the basis for identifying wangling
attacks. Since the concern is on the attackers who
have different positions than justifiable wireless
nodes, utilizing spatial in sequence to address
wangling attacks has the unique power to not only
classify the presence of these attacks but also
concentrate antagonists. An employ spatial
correlation to identifying wangling attacks is that it
will not require any additional cost or adjustment to
the wireless devices themselves.
The system implementation involves the following
modules:
1.
2.
Handling different transmission: The
wangling attacker used transmission power
of 10dB to send packets where as original
node used 15dB transmission power level
Performance detection: The results are
encouraging showing for fake positive rates
less than 10 percent, the finding rate are
above 98 percent when the threshold is
around 8dB
V. ALGORITHMS
In order to estimate the generality of
IIPS for contemplate antagonists,a set of agent
positions algorithms range from next-door neighbor
matching in signal space(RADAR ), to probabilitybased (Area-Based Probability ), and to
multilateration (Bayesian Networks) are chosen.
5.1 RADAR-Gridded:
The RADAR-Gridded algorithm is a scene-matching
position algorithm. RADAR-Gridded uses an
interpolated gesture plan, which is built from a set of
averaged RSS readings with known (x, y) positions.
Given an experimental RSS reading with an unknown
position, RADAR returns the x, y of the next-door
neighbor in the signal map to the one to concentrate,
where "adjacent" is defined as the Euclidean distance
of RSS points in an N-dimensional gesture space,
where N is the number of landmark.
5.2 Area Based Probability (ABP):
ABP also expenditure an interpolated signal
map and advance the experimental area is separated
into a regular grid of identical sized tiles. ABP
assume the division of RSS for each landmark
follows a Gaussian distribution with mean as the
expected value of RSS interpretation vectors. ABP
35
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFER
CONFERENCE ON RECENT ADVANCES
CES IN COMMUNICATION SYSTEMS
AND TECHNOLOGIES
(ICRACST’15)
TH
25 MARCH 2015
then computes the probability of the wireless device
being at each tile Li, with i =1...L,
1...L, on the floor using
5.2.1 Bayes’ rule:
(1)
Particular that the wireless join must be at
exactly one tile satisfying Pi=1 ABP normalizes the
probability and returns the most likely tiles/grids up
to its confidences
5.3 Bayesian Networks (BN):
BN position is a multi lateration algorithm
that encodes the signal-to-distance
distance propagation model
into the Bayesian Graphical Model for localization.
The vertices X and Y represent location; the
vertex si is the RSS reading from the ith
landmark; and the vertex Di presents the Euclidean
distance between the location specified by X and Y
and the ith landmark.
Fig 1:: Network Simulation for proposed scheme
6.2 Attacker Detection
VI.PERFORMANCE ANALYSIS
6.1. Simulation Environment
Our model is based on the PHY and MAC
layer of the IEEE 802.11b, which is iincluded in the
NS2.The transport protocol is User Datagram
Protocol (UDP). Traffic sources are Constant Bit
Rate (CBR). The number of nodes is equally
distributed over the entire network.
In Figure 2 show that the simulation result of the
proposed scheme
Fig 2: Attacker Detection in networks
Figure 2shows
shows the relationship between the
Attacker Detection in networks. Here the network
consists of the number of nodes associated with the
Router. Clearly we can observe that the attackers’
decreases in our scheme, the lowest attackers attack
is yielded.
6.3 Throughput
36
All Rights Reserved © 2015 IJARTET
ISSN 2394-3777 (Print)
ISSN 2394-3785 (Online)
Available online at www.ijartet.com
International Journal of Advanced Research Trends in Engineering and Technology (IJARTET)
Vol. II, Special Issue XXIII, March 2015 in association with
FRANCIS XAVIER ENGINEERING COLLEGE, TIRUNELVELI
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
INTERNATIONAL CONFER
CONFERENCE ON RECENT ADVANCES
CES IN COMMUNICATION SYSTEMS
AND TECHNOLOGIES
(ICRACST’15)
TH
25 MARCH 2015
In our future work, we will expand our idea
about congestion control mechanism with routing to
decrease the attackers attack and test it by simulation
REFERENCES
Fig 3:: Throughput with time interval
Figure 3 shows the connection between the
throughput and the time interval. As the time
increases the system attains the maximum throughput
value.
VII. CONCLUSION
This work, proposed to use received
signal strength (RSS) based spatial connection, a
corporeal property associated with every wireless
device that is hard to falsify and not reliant on
cryptography as the basis for identifying wangling
attacks in wireless networks. This approach can both
identifying the presence of attacks as well as
establish the number of antagonists , wangling the
same node identity, so that any number of attackers
can be concentratedd and can eliminate them.
Determining the number of antagonists is a
particularly challenging problem. This paper uses
IIPS mechanism that employs the minim
minimum distance
testing in addition to cluster analysis to achieve better
accuracy of determining the number of attackers
than. Furthermore, when the instruction data is
available, Support Vector Machines (SVM) based
mechanism is used to further improve the ac
accuracy of
determining the number of attackers present in the
system.
[1] Yingying Chen, Wade Trappe, Richard P. Martin “Detecting
and Localizing Wireless Spoofing Attacks”in
Attacks IEEE 2013.
[2] Jie Yang, Yingying Chen, and Jerry Cheng, “Detection and
Localization of Multiple Spoofing Attackers in Wireless
Networks” in IEEE 2012.
[3]] J. Bellardo and S. Savage, “802.11 denial-of-service
denial
attacks:
Real vulnerabilities and practical solutions,” in Proceedings of the
USENIX Security Symposium, 2003, pp. 15 – 28.
[4] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points
vulnerabilities
ties to dos attacks in 802.11 networks,” in Proceedings
of the IEEE Wireless Communications and Networking
Conference, 2004.
[5] D. Faria and D. Cheriton, “Detecting identity-based
identity
attacks in
wireless networks using signalprints,” in Proceedings of the ACM
AC
Workshop
on Wireless Security (WiSe), September 2006.
[6] Q. Li and W. Trappe, “Relationship-based
“Relationship
detection of
spoofing-related
related anomalous traffic in ad hoc networks,” in Proc.
IEEE SECON,2006.
[7] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure
“Secur and
efficient key management in mobile ad hoc networks,” in Proc.
IEEE IPDPS,2005.
[8] A. Wool, “Lightweight key management for ieee 802.11
wireless lans with key refresh and host revocation,”
ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677–686,
2005.
[9] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell,
“Detecting 802.11 MAC layer spoofing using received signal
strength,” in Proc. IEEE INFOCOM, April 2008.
[10] J. Yang, Y. Chen, and W. Trappe, “Detecting spoofing attacks
in mobile
bile wireless environments,” in Proc. IEEE SECON, 2009.
[11] Y. Chen, W. Trappe, and R. P. Martin, “Detecting and
localizing wirelss spoofing attacks,” in Proc. IEEE SECON, May
2007.
[12] M. bohge and W. Trappe, “An authentication framework for
hierarchicall ad hoc sensor networks,” in Proceedings of the ACM
Workshop on Wireless Security (WiSe), 2003, pp. 79–87.
79
[13] V.Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless
Device Identification with Radiometric Signatures”.
[14] P.Bahl and V.N.Padmanabhan, “RADAr:
ADAr: An in-Building
in
RFBased User Location and Tracking System,” Proc. IEEE
INFOCOM, 2000.
37
All Rights Reserved © 2015 IJARTET