Masquerading Attacks Detection in Mobile Ad Hoc Networks
Sohail Abbas,Mohammad Faisal,Haseeb Ur Rahman,Muhammad Zahid Khan,Madjid Merabti,Atta ur Rehman Khan +5 more
TLDR
This paper proposes the received signal-strength-based masquerading attack detection scheme, which is carried out first by each node in its one-hop vicinity and then extended to five-hop proximity for broader detection scope and improved accuracy.Abstract:
Due to the lack of centralized identity management and the broadcast nature, wireless ad hoc networks are always a palatable target for masquerading attacks. The attackers can spoof identities of privileged legitimate users for various malicious reasons, such as to launch DoS or DDoS attacks, to access unauthorized information, and to evade the detection and accountability. In the current and limited literature, masquerading attacks are mostly counteracted by signal-strength-based detection systems. However, these schemes are mostly proposed to work for infrastructure-based IEEE 802.11 wireless networks using fixed access points, air monitors, or fixed anchor nodes, which are not suitable for the ad hoc architecture. In this paper, we propose a detection system for masquerading attacks without using fixed anchor nodes or air monitors. We develop an anomaly detection model based on the statistical significant testing for our masquerading detection system that takes into consideration the signal strength fluctuation. We conduct a test bed of Samsung Galaxy-based smartphones in order to analyze the real-world signal strength variation. We also plug the real-world signal strength variation in our model for the evaluation of the detection accuracy. We propose the received signal-strength-based masquerading attack detection scheme, which is carried out first by each node in its one-hop vicinity and then extended to five-hop proximity for broader detection scope and improved accuracy. The proposed scheme is evaluated using an NS-2 network simulator for detection accuracy in different environments. The results obtained indicate that our proposed scheme produces more than 90% true positives.read more
Citations
More filters
Journal ArticleDOI
A survey on internet of vehicles: Applications, security issues & solutions
Surbhi Sharma,Baijnath Kaushik +1 more
TL;DR: A lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment.
Journal ArticleDOI
A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks
M. Islabudeen,M. K. Kavitha Devi +1 more
TL;DR: A Smart approach for intrusion detection and prevention system (SA-IDPS) to mitigate attacks in MANET by machine learning methods is proposed and experiments are conducted and tested for evaluating the performance of proposed SA- IDPS scheme.
Journal ArticleDOI
Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles
TL;DR: In this article, the authors explore the vulnerabilities in the security protocols and propose guidelines to improve the security and provide future research directions, which can be exploited by the malicious UAVs.
Journal ArticleDOI
Improving security of the Internet of Things via RF fingerprinting based device identification system
Sohail Abbas,Qassim Nasir,Douae Nouichi,Mohamed Abdelsalam,Manar Abu Talib,Omnia Abu Waraga,Atta ur Rehman Khan +6 more
TL;DR: This paper proposes a radio frequency fingerprinting-based device identification technique that uses low-cost software defined radio to capture smartphone emissions at a lower sampling rate, using the proposed preamble threshold-based detection algorithm.
Journal ArticleDOI
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions
Anshuman Singh,Brij B. Gupta +1 more
TL;DR: In this paper , the authors present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains and discuss popular performance metrics that evaluate the defense schemes.
References
More filters
Book ChapterDOI
The Sybil Attack
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Book
Applied Statistics and Probability for Engineers
TL;DR: Montgomery and Runger's Engineering Statistics text as discussed by the authors provides a practical approach oriented to engineering as well as chemical and physical sciences by providing unique problem sets that reflect realistic situations, students learn how the material will be relevant in their careers.
Journal ArticleDOI
Applied Statistics and Probability for Engineers
TL;DR: Next, the authors discuss an additive model obtained by replacing the timevarying regression coef cients by constants, and a brief summary of multivariate survival analysis, including measures of association and frailty models.
Proceedings ArticleDOI
The Sybil attack in sensor networks: analysis & defenses
TL;DR: It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.
Journal ArticleDOI
5G Internet of Things: A survey
TL;DR: The current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in5G IoT are reviewed.