Detection and Localizing Multiple Spoofing Attackers
Under a malicious spoofing attack, multiple adversaries may masquerade as the same identity and collaborate to launch a denial-of-service attack quickly. Therefore, it is important to further determine the number of attackers that masquerade as the same identity in the wireless network. Further, detecting the presence of identity-based attacks in the network provides first order information towards defending against attackers. Learning the physical location of the attackers allows the network administrators to further exploit a wide range of defense strategies. For example, we can physically visit multiple adversaries and eliminate it from the network. We then explore how to find the positions of the adversaries by integrating our attack detector into a real-time indoor localization system.
KeywordsSupport Vector Machine Node Identity Attack Detection Partition Energy Original Node
- 1.C. van Rijsbergen, Information Retrieval, Second Edition. Butterworths, 1979.Google Scholar
- 3.P. Rousseeuw, “Silhouettes: a graphical aid to the interpretation and validation of cluster analysis,” Journal of Computational and Applied Mathematics, vol. 20, no. 1, pp. 53–65, November 1987.Google Scholar
- 4.K. Wang, J. Zheng, J. Zhang, and J. Dong, “Estimating the number of clusters via system evolution for cluster analysis of gene expression data,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 5, pp. 848–853, 2009.Google Scholar
- 5.N. Cristianini and J. Shawe-Taylor, An introduction to support Vector Machines: and other kernel-based learning methods. Cambridge Univ Pr, 2000.Google Scholar
- 6.C.-C. Chang and C.-J. Lin, LIBSVM: a library for support vector machines, 2001, software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
- 7.V. Franc and V. Hlavác, “Multi-class support vector machine,” in International Conference on Pattern Recognition, vol. 16, 2002, pp. 236–239.Google Scholar
- 8.C. Hsu and C. Lin, “A comparison of methods for multiclass support vector machines,” IEEE transactions on Neural Networks, vol. 13, no. 2, pp. 415–425, 2002.Google Scholar
- 9.P. Bahl and V. N. Padmanabhan, “RADAR: An in-building RF-based user location and tracking system,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2000, pp. 775–784.Google Scholar
- 10.E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: A comparative study,” in Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004), Oct. 2004, pp. 406–414.Google Scholar
- 11.D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A. S. Krishnakumar, “Bayesian indoor positioning systems,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2005, pp. 324–331.Google Scholar