Advertisement

Attack Detection Model

  • Jie Yang
  • Yingying ChenEmail author
  • Wade Trappe
  • Jerry Cheng
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

User spoofing has a serious impact to the normal operation of wireless and sensor networks. It is thus desirable to detect the presence of identity-based attacks and eliminate them from the network. The traditional approach to address identity-based attacks is to apply cryptographic authentication. However, authentication requires additional infrastructural overhead and computational power associated with distributing, and maintaining cryptographic keys. Due to the limited power and resources available to the wireless devices and sensor nodes, it is not always possible to deploy authentication. In this chapter, we take a different approach by using the physical properties associated with wireless transmissions to detect identity-based attacks. Specifically, we utilizes the Received Signal Strength (RSS) measured across a set of landmarks (i.e., reference points with known locations) to perform detection of identity-based attacks. In this chapter, we focus on static nodes, which are common for most identity-based attacks scenarios (Sheng et al., Detecting 802.11 MAC layer spoofing using received signal strength, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008). Our scheme does not add any overhead to the wireless devices and sensor nodes.

References

  1. 1.
    Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.Google Scholar
  2. 2.
    P. Bahl and V. N. Padmanabhan, “RADAR: An in-building RF-based user location and tracking system,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2000, pp. 775–784.Google Scholar
  3. 3.
    M. Youssef, A. Agrawal, and A. U. Shankar, “WLAN location determination via clustering and probability distributions,” in Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom), Mar. 2003, pp. 143–150.Google Scholar
  4. 4.
    Y. Chen, K. Kleisouris, X. Li, W. Trappe, and R. P. Martin, “The robustness of localization algorithms to signal strength attacks: a comparative study,” in Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS), June 2006, pp. 546–563.Google Scholar
  5. 5.
    T. Roos, P. Myllymaki, H. Tirri, P. Misikangas, and J. Sievanen, “A probabilistic approach to WLAN user location estimation,” International Journal of Wireless Information Networks, vol. 9, no. 3, pp. 155–164, July 2002.Google Scholar
  6. 6.
    Y. Chen, J.-A. Francisco, W. Trappe, and R. P. Martin, “A practical approach to landmark deployment for indoor localization,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON), September 2006.Google Scholar
  7. 7.
    A. Goldsmith, Wireless Communications: Principles and Practice. New York, NY, USA: Cambridge University Press, 2005.CrossRefGoogle Scholar
  8. 8.
    T. Sarkar, Z. Ji, K. Kim, A. Medouri, and M. Salazar-Palma, “A survey of various propagation models for mobile communication,” Antennas and Propagation Magazine, IEEE, vol. 45, no. 3, pp. 51–82, June 2003.Google Scholar
  9. 9.
    M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. New York: Courier Dover, 1965.Google Scholar
  10. 10.
    L. Kaufman and P. J. Rousseeuw, Finding Groups in Data: An Introduction to Cluster Analysis. Wiley Series in Probability and Statistics, 1990.Google Scholar
  11. 11.
    Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007.Google Scholar
  12. 12.
    G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic, “Models and solutions for radio irregularity in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 2, pp. 221–262, 2006.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Jie Yang
    • 1
  • Yingying Chen
    • 2
    Email author
  • Wade Trappe
    • 3
  • Jerry Cheng
    • 4
  1. 1.Department of Computer Science and EngineeringOakland UniversityRochesterUSA
  2. 2.Department of Electrical & Computer EngineeringStevens Institute of TechnologyHobokenUSA
  3. 3.Wireless Information Network LabRutgers, The State University of New JerseyNorth BrunswickUSA
  4. 4.Rutgers, The State University of New JerseyNew BrunswickUSA

Personalised recommendations