scispace - formally typeset
Open AccessJournal ArticleDOI

Masquerading Attacks Detection in Mobile Ad Hoc Networks

TLDR
This paper proposes the received signal-strength-based masquerading attack detection scheme, which is carried out first by each node in its one-hop vicinity and then extended to five-hop proximity for broader detection scope and improved accuracy.
Abstract
Due to the lack of centralized identity management and the broadcast nature, wireless ad hoc networks are always a palatable target for masquerading attacks. The attackers can spoof identities of privileged legitimate users for various malicious reasons, such as to launch DoS or DDoS attacks, to access unauthorized information, and to evade the detection and accountability. In the current and limited literature, masquerading attacks are mostly counteracted by signal-strength-based detection systems. However, these schemes are mostly proposed to work for infrastructure-based IEEE 802.11 wireless networks using fixed access points, air monitors, or fixed anchor nodes, which are not suitable for the ad hoc architecture. In this paper, we propose a detection system for masquerading attacks without using fixed anchor nodes or air monitors. We develop an anomaly detection model based on the statistical significant testing for our masquerading detection system that takes into consideration the signal strength fluctuation. We conduct a test bed of Samsung Galaxy-based smartphones in order to analyze the real-world signal strength variation. We also plug the real-world signal strength variation in our model for the evaluation of the detection accuracy. We propose the received signal-strength-based masquerading attack detection scheme, which is carried out first by each node in its one-hop vicinity and then extended to five-hop proximity for broader detection scope and improved accuracy. The proposed scheme is evaluated using an NS-2 network simulator for detection accuracy in different environments. The results obtained indicate that our proposed scheme produces more than 90% true positives.

read more

Citations
More filters
Journal ArticleDOI

A survey on internet of vehicles: Applications, security issues & solutions

TL;DR: A lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment.
Journal ArticleDOI

A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks

TL;DR: A Smart approach for intrusion detection and prevention system (SA-IDPS) to mitigate attacks in MANET by machine learning methods is proposed and experiments are conducted and tested for evaluating the performance of proposed SA- IDPS scheme.
Journal ArticleDOI

Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles

TL;DR: In this article, the authors explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions, which can be exploited by the malicious UAVs.
Journal ArticleDOI

Improving security of the Internet of Things via RF fingerprinting based device identification system

TL;DR: This paper proposes a radio frequency fingerprinting-based device identification technique that uses low-cost software defined radio to capture smartphone emissions at a lower sampling rate, using the proposed preamble threshold-based detection algorithm.
Journal ArticleDOI

Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions

TL;DR: In this paper , the authors present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains and discuss popular performance metrics that evaluate the defense schemes.
References
More filters
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Book

Applied Statistics and Probability for Engineers

TL;DR: Montgomery and Runger's Engineering Statistics text as discussed by the authors provides a practical approach oriented to engineering as well as chemical and physical sciences by providing unique problem sets that reflect realistic situations, students learn how the material will be relevant in their careers.
Journal ArticleDOI

Applied Statistics and Probability for Engineers

Robert V Brill
- 01 Feb 2004 - 
TL;DR: Next, the authors discuss an additive model obtained by replacing the timevarying regression coefŽ cients by constants, and a brief summary of multivariate survival analysis, including measures of association and frailty models.
Proceedings ArticleDOI

The Sybil attack in sensor networks: analysis & defenses

TL;DR: It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.
Journal ArticleDOI

5G Internet of Things: A survey

TL;DR: The current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in5G IoT are reviewed.