Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
Reads0
Chats0
TLDR
The results show that it is possible to detect wireless identity-based attacks with both a high detection rate and a low false-positive rate, thereby providing strong evidence of the effectiveness of the attack detector utilizing the spatial correlation of RSS and the attack localizer.Abstract:
Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible, because it requires key management and additional infrastructural overhead. In this paper, we propose a method for detecting both spoofing and Sybil attacks by using the same set of techniques. We first propose a generalized attack-detection model that utilizes the spatial correlation of received signal strength (RSS) inherited from wireless nodes. We further provide a theoretical analysis of our approach. We then derive the test statistics for detection of identity-based attacks by using the K-means algorithm. Our attack detector is robust when handling the situations of attackers that use different transmission power levels to attack the detection scheme. We further describe how we integrated our attack detector into a real-time indoor localization system, which can also localize the positions of the attackers. We show that the positions of the attackers can be localized using either area- or point-based localization algorithms with the same relative errors as in the normal case. We further evaluated our methods through experimentation in two real office buildings using both an IEEE 802.11 (WiFi) network and an IEEE 802.15.4 (ZigBee) network. Our results show that it is possible to detect wireless identity-based attacks with both a high detection rate and a low false-positive rate, thereby providing strong evidence of the effectiveness of the attack detector utilizing the spatial correlation of RSS and the attack localizer.read more
Citations
More filters
Journal ArticleDOI
SIT: A Lightweight Encryption Algorithm for Secure Internet of Things
TL;DR: Simulations result shows the algorithm provides substantial security in just five encryption rounds, and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms.
Journal ArticleDOI
Physical-layer authentication for wireless security enhancement: current challenges and future developments
TL;DR: This article presents a cross-layer authentication approach relying on a composite security key that can seamlessly integrate physical-layer and upper-layer Authentication schemes, and proposes the use of the multi-attribute multi-observation technique for enhancing the authentication reliability.
Journal ArticleDOI
Review: A survey on cross-layer solutions for wireless sensor networks
TL;DR: This survey proposes to identify the key problems of WSNs and gather available cross-layer solutions for them that have been proposed so far, in order to provide insights on the identification of open issues and provide guidelines for future proposals.
Journal ArticleDOI
Lightweight Sybil Attack Detection in MANETs
TL;DR: This research proposes a lightweight scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware, such as directional antennae or a geographical positioning system and demonstrates that the proposed scheme detects Sybil identities with good accuracy even in the presence of mobility.
Journal ArticleDOI
PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead
Liang Xiao,Xiaoyue Wan,Zhu Han +2 more
TL;DR: This work proposes a logistic regression-based authentication to remove the assumption on the known channel model, and thus be applicable to more generic wireless networks, and designs a distributed Frank–Wolfe-based PHY-layer authentication to further reduce the communication overhead between the landmarks and the security agent.
References
More filters
Book
The Elements of Statistical Learning: Data Mining, Inference, and Prediction
TL;DR: In this paper, the authors describe the important ideas in these areas in a common conceptual framework, and the emphasis is on concepts rather than mathematics, with a liberal use of color graphics.
Proceedings ArticleDOI
RADAR: an in-building RF-based user location and tracking system
TL;DR: RADAR is presented, a radio-frequency (RF)-based system for locating and tracking users inside buildings that combines empirical measurements with signal propagation modeling to determine user location and thereby enable location-aware services and applications.
Proceedings Article
Wireless communications
TL;DR: This book aims to provide a chronology of key events and individuals involved in the development of microelectronics technology over the past 50 years and some of the individuals involved have been identified and named.