scispace - formally typeset
Open AccessJournal ArticleDOI

Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks

Reads0
Chats0
TLDR
The results show that it is possible to detect wireless identity-based attacks with both a high detection rate and a low false-positive rate, thereby providing strong evidence of the effectiveness of the attack detector utilizing the spatial correlation of RSS and the attack localizer.
Abstract
Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible, because it requires key management and additional infrastructural overhead. In this paper, we propose a method for detecting both spoofing and Sybil attacks by using the same set of techniques. We first propose a generalized attack-detection model that utilizes the spatial correlation of received signal strength (RSS) inherited from wireless nodes. We further provide a theoretical analysis of our approach. We then derive the test statistics for detection of identity-based attacks by using the K-means algorithm. Our attack detector is robust when handling the situations of attackers that use different transmission power levels to attack the detection scheme. We further describe how we integrated our attack detector into a real-time indoor localization system, which can also localize the positions of the attackers. We show that the positions of the attackers can be localized using either area- or point-based localization algorithms with the same relative errors as in the normal case. We further evaluated our methods through experimentation in two real office buildings using both an IEEE 802.11 (WiFi) network and an IEEE 802.15.4 (ZigBee) network. Our results show that it is possible to detect wireless identity-based attacks with both a high detection rate and a low false-positive rate, thereby providing strong evidence of the effectiveness of the attack detector utilizing the spatial correlation of RSS and the attack localizer.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

SIT: A Lightweight Encryption Algorithm for Secure Internet of Things

TL;DR: Simulations result shows the algorithm provides substantial security in just five encryption rounds, and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms.
Journal ArticleDOI

Physical-layer authentication for wireless security enhancement: current challenges and future developments

TL;DR: This article presents a cross-layer authentication approach relying on a composite security key that can seamlessly integrate physical-layer and upper-layer Authentication schemes, and proposes the use of the multi-attribute multi-observation technique for enhancing the authentication reliability.
Journal ArticleDOI

Review: A survey on cross-layer solutions for wireless sensor networks

TL;DR: This survey proposes to identify the key problems of WSNs and gather available cross-layer solutions for them that have been proposed so far, in order to provide insights on the identification of open issues and provide guidelines for future proposals.
Journal ArticleDOI

Lightweight Sybil Attack Detection in MANETs

TL;DR: This research proposes a lightweight scheme to detect the new identities of Sybil attackers without using centralized trusted third party or any extra hardware, such as directional antennae or a geographical positioning system and demonstrates that the proposed scheme detects Sybil identities with good accuracy even in the presence of mobility.
Journal ArticleDOI

PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead

TL;DR: This work proposes a logistic regression-based authentication to remove the assumption on the known channel model, and thus be applicable to more generic wireless networks, and designs a distributed Frank–Wolfe-based PHY-layer authentication to further reduce the communication overhead between the landmarks and the security agent.
References
More filters
Book

The Elements of Statistical Learning: Data Mining, Inference, and Prediction

TL;DR: In this paper, the authors describe the important ideas in these areas in a common conceptual framework, and the emphasis is on concepts rather than mathematics, with a liberal use of color graphics.
Book

Wireless Communications

Proceedings ArticleDOI

RADAR: an in-building RF-based user location and tracking system

TL;DR: RADAR is presented, a radio-frequency (RF)-based system for locating and tracking users inside buildings that combines empirical measurements with signal propagation modeling to determine user location and thereby enable location-aware services and applications.
Proceedings Article

Wireless communications

TL;DR: This book aims to provide a chronology of key events and individuals involved in the development of microelectronics technology over the past 50 years and some of the individuals involved have been identified and named.
Trending Questions (1)
How can we detect attacks on the network that involve the fabrication or theft of identities?

The paper proposes a method for detecting identity-based attacks in wireless networks using the spatial correlation of received signal strength.