Detection and Localizing Multiple Spoofing Attackers

  • Jie Yang
  • Yingying ChenEmail author
  • Wade Trappe
  • Jerry Cheng
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


Under a malicious spoofing attack, multiple adversaries may masquerade as the same identity and collaborate to launch a denial-of-service attack quickly. Therefore, it is important to further determine the number of attackers that masquerade as the same identity in the wireless network. Further, detecting the presence of identity-based attacks in the network provides first order information towards defending against attackers. Learning the physical location of the attackers allows the network administrators to further exploit a wide range of defense strategies. For example, we can physically visit multiple adversaries and eliminate it from the network. We then explore how to find the positions of the adversaries by integrating our attack detector into a real-time indoor localization system.


Support Vector Machine Node Identity Attack Detection Partition Energy Original Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    C. van Rijsbergen, Information Retrieval, Second Edition. Butterworths, 1979.Google Scholar
  2. 2.
    T. Fawcett, “An introduction to ROC analysis,” Pattern Recognition Letters, Elsevier, vol. 27, pp. 861–874, 2006.CrossRefGoogle Scholar
  3. 3.
    P. Rousseeuw, “Silhouettes: a graphical aid to the interpretation and validation of cluster analysis,” Journal of Computational and Applied Mathematics, vol. 20, no. 1, pp. 53–65, November 1987.Google Scholar
  4. 4.
    K. Wang, J. Zheng, J. Zhang, and J. Dong, “Estimating the number of clusters via system evolution for cluster analysis of gene expression data,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 5, pp. 848–853, 2009.Google Scholar
  5. 5.
    N. Cristianini and J. Shawe-Taylor, An introduction to support Vector Machines: and other kernel-based learning methods. Cambridge Univ Pr, 2000.Google Scholar
  6. 6.
    C.-C. Chang and C.-J. Lin, LIBSVM: a library for support vector machines, 2001, software available at
  7. 7.
    V. Franc and V. Hlavác, “Multi-class support vector machine,” in International Conference on Pattern Recognition, vol. 16, 2002, pp. 236–239.Google Scholar
  8. 8.
    C. Hsu and C. Lin, “A comparison of methods for multiclass support vector machines,” IEEE transactions on Neural Networks, vol. 13, no. 2, pp. 415–425, 2002.Google Scholar
  9. 9.
    P. Bahl and V. N. Padmanabhan, “RADAR: An in-building RF-based user location and tracking system,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2000, pp. 775–784.Google Scholar
  10. 10.
    E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: A comparative study,” in Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004), Oct. 2004, pp. 406–414.Google Scholar
  11. 11.
    D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A. S. Krishnakumar, “Bayesian indoor positioning systems,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2005, pp. 324–331.Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Jie Yang
    • 1
  • Yingying Chen
    • 2
    Email author
  • Wade Trappe
    • 3
  • Jerry Cheng
    • 4
  1. 1.Department of Computer Science and EngineeringOakland UniversityRochesterUSA
  2. 2.Department of Electrical & Computer EngineeringStevens Institute of TechnologyHobokenUSA
  3. 3.Wireless Information Network LabRutgers, The State University of New JerseyNorth BrunswickUSA
  4. 4.Rutgers, The State University of New JerseyNew BrunswickUSA

Personalised recommendations