ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Special Issue Article Open Access

Mitigating Spoofing Attacks through Received Signal Strength in Wireless Networks

Abstract

Spoofing Attack is one of the vulnerabilities in the networks in which the adversary assumes the identity of another node in the network and to establish a connection that will allow gaining access to the other hosts and their sensitive data. It will decrease the performance of the network and violate many security issues. With the open medium, distributed cooperation and constrained capabilities, the wireless nodes are more vulnerable to such type of attacks compared with wired networks. Even though the identity of a node can be verified through cryptographic mechanisms, the conventional security approaches are not always desirable because it requires key management and additional infrastructural overheads. The detection and localization of multiple attacks makes complex when the multiple number attackers spoofing attacks the mobile ad hoc attacks. In which the RSS and SVM deals with the spoofing attacks, it determines the number of attackers in the wireless network and identify the location of the spoofing attackers. However it localizes the spoofing attackers but it does not consider the legitimate users. After the process of localizing the attackers in the wireless network, the attackers may mitigate from the network without degrading the legitimate users. Observation of the behavior of the neighborhood which is performed by the normal network nodes is one of the common methods for detecting attacks in wireless networks. Local monitoring which also deals with the process of neighborhood analysis in multi hop wireless networks. This can be implemented by UnMASK. In this paper, propose the UnMASK (Utilizing Neighbor Monitoring for Attack Mitigation) that mitigate the multiple spoofing attackers without give distortions to the legitimate users in the networks.UNMASK uses as a fundamental building block the ability of a node to oversee its neighboring nodes’ communication. On top of UNMASK, build a secure routing protocol, LSR, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. From that can analyze the nodes and neighbor node relations by means of communication over them. The experiments those are undergone to produce the results of mitigation of multiple spoofing after the detection and localization process.

J.Saranya ,V.Pugazhenthi

To read the full article Download Full Article | Visit Full Article