| Keywords | 
        
            | Wireless network security, spoofing attack, attack detection, localization | 
        
            | INTRODUCTION | 
        
            | The wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily       purchase low-cost wireless devices and use these commonly available platforms to launch a variety of attacks with little       effort. Among various types of attacks, identity-based spoofing attacks are especially easy to launch and can cause       significant damage to network performance. For instance, in an 802.11 network, it is easy for an attacker to gather useful       MAC address information during passive monitoring and then modify its MAC address by simply issuing an ifconfig       command to masquerade as another device. In spite of existing 802.11 security techniques including Wired Equivalent       Privacy (WEP), WiFi Protected Access (WPA), or 802.11i (WPA2), such methodology can only protect data frames—an       attacker can still spoof management or control frames to cause significant impact on networks. | 
        
            | Spoofing attacks can further facilitate a variety of traffic injection attacks, such as attacks on access control lists,       rogue access point (AP) attacks, and eventually Denial-of- Service (DoS) attacks. A broad survey of possible spoofing       attacks can be found. Moreover, in a large-scale network, multiple adversaries may masquerade as the same identity and       collaborate to launch malicious attacks such as network resource utilization attack and denial-of-service attack quickly.       Therefore, it is important to 1) detect the presence of spoofing attacks, 2) determine the number of attackers, and 3) localize       multiple adversaries and eliminate them. | 
        
            | Most existing approaches to address potential spoofing attacks employ cryptographic schemes. However, the       application of cryptographic schemes requires reliable key distribution, management, and maintenance mechanisms. It is       not always desirable to apply these cryptographic methods because of its infrastructural, computational, and management       overhead. To use received signal strength (RSS)-based spatial correlation, a physical property associated with each wireless       node that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks. | 
        
            | It first divides the network into a set of zones, establish trust levels for each zone, and detect untrustworthy zones       by using the Sequential Probability Ratio Test (SPRT).When multiple nodes are compromised in one zone; they can all be       detected and revoked at one time. The SPRT decides a zone to be untrustworthy if the zone’s trust is continuously       maintained at low level or is quite often changed from high level to low level. | 
        
            | PRELIMINARIES | 
        
            | The main contributions of the work are: 1) GADE: a generalized attack detection model (GADE) that can both       detect spoofing attacks as well as determine the number of adversaries using cluster analysis methods grounded on RSSbased       spatial correlations among normal devices and adversaries; and 2) IDOL: an integrated detection and localization       system that can both detect attacks as well as find the positions of multiple adversaries even when the adversaries vary their       transmission power levels. | 
        
            | GENERALIZED ATTACK DETECTION MODEL | 
        
            | In GADE, the Partitioning Around Medoids (PAM) cluster analysis method is used to perform attack detection.       We formulate the problem of determining the number of attackers as a multiclass detection problem. We then applied       cluster-based methods to determine the number of attacker. | 
        
            | Localization of Attackers | 
        
            | Identify the positions of multiple adversaries even whenthe adversaries vary their transmission power levels.The main       contribution of the paper is organized areas follows: | 
        
            | - To effectively detect the presence of spoofing attack | 
        
            | - To count the number of attackers | 
        
            | - To identify the location of multiple adversaries inthe network | 
        
            | - To provide solution to identify adversaries in the network where in there is no additional cost or modification to       the wireless devices themselves | 
        
            | - To avoid authentication key management | 
        
            | - To avoid overhead | 
        
            | - To develop a mechanism where in there is low false positive rate | 
        
            | Attack Detection Using Cluster Analysis | 
        
            | The RSS-based spatial correlation inherited from wireless nodes to perform spoofing attack detection. It also       showed that the RSS readings from a wireless node may fluctuate and should cluster together. In particular, the RSS       readings over time from the same physical location will belong to the same cluster points in the n-dimensional signal       space, while the RSS readings from different locations over time should form different clusters in signal space. | 
        
            | In Fig. 2.1, which presents RSS reading vectors of three landmarks (i.e., n = 3) from two different physical       locations. Under the spoofing attack, the victim andthe attacker are using the same ID to transmit data packets, and the RSS       readings of that ID is the mixture readings measured from each individual node (i.e., spoofing node or victim node). | 
        
            | Thus formulate spoofing detection as a statistical significance testing problem, where the null hypothesis is       H0 : normal (no spoofing attack): | 
        
            | In significance testing, a test statistic Tis used to evaluatewhether observed data belong to the null-hypothesis or not. | 
        
            | DETERMINING THE NUMBER OF ATTACKERS | 
        
            | Problem Formulation | 
        
            | The Precision is defined as | 
        
            |  | 
        
            | F-measure : F-measure is originated from informationretrieval and measures the accuracy of a test by considering both the       Hit Rate and the Precision . | 
        
            |  | 
        
            | Multiclass ROC graph: We further use the multiclass ROC graph to measure the effectiveness of our mechanisms.       Particularly, we use two methods :class- reference basedandbenefit error based. The class-reference-based formulation       produces C different ROC curves when handling C classes based on Pi and Ni. Further, in the C- class detection problem,       the traditional 2 x2 confusion matrix, including True Positives, False Positives, False Negatives, and True Negatives,       becomes an C x C matrix, which contains the C benefits (true positives) and C2 - C possible errors (false positives). The       benefit-error-based method is based on the C x C matrix. For example, when C = 3 with possible number of attackers of       {2,3,4}, the benefits are 3 and the possible errors are 6. | 
        
            | Silhouette Plot | 
        
            | Attacker Number Determination | 
        
            | A Silhouette Plot is a graphical representation of a cluster. To determine the number of attackers, we construct       Silhouettes in the following way: the RSS sample points S= {s1,...,sN}(with N as the total number of samples) are the dataset and we let C=(c1,...,cK)be its clustering into K clusters, as shown in Fig. 8. Let d(sk,sl)be the distance between skand sl.       Let cj=(sj       1,...,sj       mj)be the jth cluster, j =1,...,K , where mj=|cj|. | 
        
            | Based on this observation, we developed SILENCE,testingSILhouette Plot and System EvolutioN with minimum       distanCE of cluster, which evaluates the minimum distance between clusters on top of the pure cluster analysis to improve       the accuracy of determining the number of attackers. Additionally, when the training data are available. | 
        
            | Support Vector Machines-Based Mechanism | 
        
            | Provided the training data collected during the offline training phase, we can further improve the performance of       determining the number of spoofing attackers. In addition, given several statistic methods available to detect the number of       attackers, such as System Evolution and SILENCE, we can combine the characteristics of these methods to achieve a       higher detection rate.using Support Vector Machines to classify the number of the spoofing attackers. The advantage of using SVM is that it can combine the intermediate results (i.e., features) fromdifferent statistic methods to build a model       based on training data to accurately predict the number of attackers. | 
        
            | IDOL: INTEGRATED DETECTION ANDLOCALIZATION FRAMEWORK | 
        
            | IDOL: an Integrate Detecti On and Localization system that can both detect attacks as well as find the positions of       multiple adversaries even when the adversaries vary their transmission power levels. | 
        
            | DRAWBACKS | 
        
            | ? The existing detection mechanism is highly effective in both detecting the presence of attacks but considers all the       location as single zone. | 
        
            | ? Location information taken from victim as well as adversaries is directly taken from the corresponding nodes       themselves. Not the neighbor nodes are queried for their location information. i.e., the spatial readings from node       to base station alone are taken. | 
        
            | ? Since the approach requires fixed node locations, it cannot be used when nodes are expected to move. | 
        
            | PROPOSED SYSTEM | 
        
            | The proposed system work is motivated from mitigating the limitations of previous schemes. In particular, the new       system proposes a method in which the nodes are fixed as well as in movement. A reputation-based trust management       scheme is designed to facilitate fast detection of compromised nodes. The key idea of the scheme is to detect untrustworthy       zones and perform software attestation against nodes in these zones to detect and revoke the ones that are compromised. | 
        
            | Specifically, first divides the network into a set of zones, establish trust levels for each zone, and detect       untrustworthy zones by using the Sequential Probability Ratio Test (SPRT). The SPRT decides a zone to be untrustworthy       if the zone’s trust is continuously maintained at low level or is quite often changed from high level to low level. once a zone       is determined to be untrustworthy, the base station or the network operator performs software attestation against all nodes       in the untrustworthy zone, detects compromised nodes with subverted software modules, and physically revokes them. | 
        
            | In addition, a novel mobile replica detection scheme is proposed based on the Sequential Probability Ratio Test       (SPRT). The new system uses the fact that an uncompromised mobile node should never move at speeds in excess of the       system-configured maximum speed. As a result, a benign mobile sensor node’s measured speed will nearly always be less       than the system-configured maximum speed as long as it employs a speed measurement system with a low error rate. the       other hand, replica nodes are in two or more places at the same time. This makes it appear as if the replicated node is       moving much faster than any of the benign nodes, and thus the replica nodes?? measured speeds will often be over the       system-configured maximum speed. | 
        
            | ADVANTAGES | 
        
            | ? By detecting an entire zone at once, the system can identify the approximate source of bad behavior and react       quickly, rather than waiting for a specific node to be identified. | 
        
            | ? When multiple nodes are compromised in one zone, they can all be detected and revoked at one time. | 
        
            | ? The proposed system validates the effectiveness, efficiency, and robustness of the scheme through analysis and       simulation experiments. | 
        
            | ? The new system finds that the main attack against the SPRT-based scheme is when replica nodes fail to provide       signed location and time information for speed measurement. | 
        
            | ? To overcome this attack, the new system employs a quarantine defense technique to block the noncompliant       nodes. | 
        
            | ? It provides analyses of the number of speed measurements needed to make replica detection decisions, which       shows is quite low, and the amount of overhead incurred by running the protocol. | 
        
            | SYSTEM IMPLEMENTATION MODULE | 
        
            | The below modules are used in project. They are | 
        
            | SPOOFING ATTACK DETECTION | 
        
            | In this module, spoofing attack detection is found out. To study Received Signal Strength (RSS), a property       closely correlated with location in physical space and is readily available in the existing wireless networks. The RSS       readings at the same physical location are similar, whereas the RSS readings at different locations in physical space are       distinctive. Thus, the RSS readings present strong spatial correlation characteristics. | 
        
            | The Received Signal Strength value vector as s = (s1, s2,...sn) where n is the number of landmarks/access points that are       monitoring the RSS of the wireless nodes and know their locations. Generally, the RSS at the ith landmark from a wireless       node is distributed as | 
        
            | Si (dj) [dBm] = P (d0) [dBm] - 10 log (dj/d0) + Xi | 
        
            | where P(d0) represents the transmitting power of the node at the reference distance d0, dj is the distance between the       wireless node j and the ith landmark, and the path loss exponent, Xi is the shadow fading which is given as input. For       simplicity, the wireless nodes have the same transmission power. If the received signal strength does not match in       successive RSS values, then the node is said to be malicious. | 
        
            | MOBILE NODE NETWORK CREATION | 
        
            | In this module, a form is generated which contains a text box to get node id and the id is saved in to „Nodes??       table. During network creation, the nodes with id will be displayed in random X and Y position. The base station node is       need not be displayed as it is programmatically listens and updates the location information of all the nodes when they are       in movement. | 
        
            | MOBILE MOVEMENT (RANDOM WALK) WITHIN GIVEN SPEED | 
        
            | In this module, all the nodes are roaming in any directions (their walk is updated by incrementing x-axis or y-axis       or both at a movement with any number of pixels within the specified maximum limit. In practical situation, the nodes can       move with their physical capabilities. For sake of convenience, if the nodes reach the picture box limit, then they move in       opposite direction so that they roam in the rectangular boundary of the picture box control. | 
        
            | UPDATE LOCATION INFORMATION TO ITS NEIGHBORS | 
        
            | In this module, all the nodes are calculating the neighbor nodes with their transmission range (specified in „n??       units common for all nodes. It means than all the sensor nodes are having homogeneous transmission ranges). Then it gives       the location information i.e., its position to all of its neighbors. It occurs for all the nodes at regular intervals. The timer       control is provided and the time is considered in global aspect. All the nodes are having unique time values. | 
        
            | BASE STATION UPDATES LOCATION INFORMATION OF ALL NODES | 
        
            | In this module, the base station is collecting the location information from all nodes. It occurs for all the nodes at       regular intervals. It is assumed that no two nodes are in same location since the nodes purpose is to serve individually a       specific area. | 
        
            | REPLICATE NODE | 
        
            | In this module, the node is updating its location information to base station with one of the remaining nodes. It       means that it is replicating some other node. This result in, at a given time, both the nodes are sending same location       information to the base station of which one is true and other is false. | 
        
            | BASE STATION IDENTIFIES THE MOBILE REPLICATION ATTACK | 
        
            | This module presents the details of the technique to detect replica node attacks in mobile sensor networks. In static       sensor networks, a sensor node is regarded as being replicated if it is placed in more than one location. If nodes are moving       around in network, however, this technique does not work, because a benign mobile node would be treated as a replica due       to its continuous change in location. | 
        
            | CONCLUSION | 
        
            | This project proposed to use received signal strength-based spatial correlation, a physical property associated with       each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in       wireless networks. It provided theoretical analysis of using the spatial correlation of RSS inherited from wireless nodes for       attack detection. It derived the test statistic based on the cluster analysis of RSS readings. The approach can both detects the       presence of attacks as well as determine the number of adversaries, spoofing the same node identity, so that can localize       any number of attackers and eliminate them. | 
        
            | In addition, a zone-based node compromise detection scheme is proposed using the Sequential Probability Ratio       Test (SPRT). Furthermore, several possible attacks are described against the proposed scheme and proposed countermeasures       against these attacks. The scheme is evaluated in simulation under various scenarios. The experimental results       show that the scheme quickly detects untrustworthy zones with a small number of zone-trust reports. | 
        
            |  | 
        
            | Tables at a glance | 
        
            | 
                
                    
                        |  |  
                        | Table 1 |  | 
        
            |  | 
        
            | Figures at a glance | 
        
            | 
                
                    
                        |  |  |  |  |  
                        | Figure 1 | Figure 2 | Figure 3 | Figure 4 |  | 
        
            |  | 
        
            | References | 
        
            | 
                Bellardo  J. and Savage S. (2003) “802.11 Denial-of-Service Attacks:Real Vulnerabilities  and Practical Solutions”, Proc. USENIX Security Symp, pp. 15-28.
 Bohge  M. and Trappe W. (2003) “An Authentication Framework for Hierarchical Ad Hoc  Sensor Networks”, Proc. ACM Workshop Wireless Security (WiSe), pp. 79-87.
 Brik  V., Banerjee S., Gruteser M. and Oh s. (2008) “Wireless Device Identification  with Radiometric Signatures” ,Proc. 14th ACM Int’l Conf. Mobile Computing and  Networking, pp. 116-127.
 Chen  Y., Trappe W., and Martin R.P. (May 2007) “Detecting and Localizing Wireless  Spoofing Attacks”, Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc  Comm. and Networks, pp.5-10.
 Chen  Y., Kleisouris K., Li X., Trappe W. and Martin R.P. (2006 ) “The Robustness of  Localization Algorithms to Signal Strength Attacks: A Comparative Study”, Proc.  Int’l Conf. Distributed Computing in Sensor Systems (DCOSS), pp. 546-563.
 Faria  D. and Cheriton D. (2006) “Detecting Identity-Based Attacks in Wireless  Networks Using Signalprints”, Proc. ACM Workshop Wireless Security (WiSe).
 Ferreri  F., Bernaschi M., and Valcamonici L. (2004) “Access Points Vulnerabilities to  Dos Attacks in 802.11 Networks”, Proc. IEEE Wireless Comm. and Networking Conf.
 Franc  V. and Hlava´c V. ( 2002 ) “Multi-Class Support Vector Machine”,Proc. Int’l  Conf. Pattern Recognition (ICPR), vol. 16, pp. 236-239.
 Guo  F. and Chiueh T.( 2006) “Sequence Number-Based MAC Address Spoof Detection”,  Proc. Eighth Int’l Conf. Recent Advances in Intrusion Detection,pp. 309-329.
 Li  Q. and Trappe W. (2006) “Relationship-Based Detection of Spoofing- Related  Anomalous Traffic in Ad Hoc Networks”, Proc. Ann. IEEE Comm. Soc. on IEEE and  Sensor and Ad Hoc Comm. and Networks, pp.6-8.
 Sang  L. and Arora A. (2008) ”Spatial Signatures for Lightweight Security in Wireless  Sensor Networks”, Proc. IEEE INFOCOM, pp. 2137-2145.
 Sheng  Y., Tan K., Chen G., Kotz D. and Campbell A. (2008) “Detecting 802.11 MAC Layer  Spoofing Using Received Signal Strength”, Proc. IEEE INFOCOM.
  Wool A. (2005) “Lightweight Key Management for  IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation”, ACM/Springer  Wireless Networks, vol. 11, no. 6, pp. 677-686.
 Wu  B., Wu J., Fernandez E. and Magliveras S. (2005) “Secure and Efficient Key  Management in Mobile Ad Hoc Networks”, Proc. IEEE Int’l Parallel and  Distributed Processing Symp. (IPDPS).
  Wang k. (2007) “Estimating the Number of  Clusters via System Evolution for Cluster Analysis of Gene Expression  Data”,Technical Report NO. 2007-258, Computer Science Dept., Xidian Univ., P.R.  China.
 |