Skip to main content

Detecting Mobile Agents Using Identity Fraud

  • Chapter
  • First Online:
  • 389 Accesses

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

Attacks involving identity fraud can facilitate a variety of advanced attacks to significantly impact the normal operation of wireless networks (F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points vulnerabilities to dos attacks in 802.11 networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004; J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proceedings of the USENIX Security Symposium, 2003, pp. 15–28; D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006; Q. Li andW. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006). Identity fraud performed by mobile wireless devices may further inflict security and privacy damages on the social life of the individual who carries wireless devices. We call these kind of attacks as mobile spoofing attacks. There has been active work in detecting spoofing attacks (D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006; Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007. (Acceptance rate: 20%); Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008). D. Faria and D. Cheriton, (“Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006) proposed the use of matching rules of Received Signal Strength (RSS) for spoofing detection, (Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007. used K-means cluster analysis of RSS, and (Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.) modeled RSS readings as a Gaussian mixture model to capture antenna diversity. However, these mechanisms only work in static wireless environments, i.e., the victim node has a fixed location. In this chapter, we focus on spoofing attack detection in mobile wireless environments, that is, the wireless devices including the victim node and/or the spoofing node are moving around. Thus, detecting identity fraud launched by mobile agents is important as it allows the network to further exploit a wide range of defense strategies in different network layers, and consequently helps to ensure secure and trustworthy communication in emerging mobile pervasive computing.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points vulnerabilities to dos attacks in 802.11 networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004.

    Google Scholar 

  2. J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proceedings of the USENIX Security Symposium, 2003, pp. 15–28.

    Google Scholar 

  3. D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006.

    Google Scholar 

  4. Q. Li and W. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006.

    Google Scholar 

  5. Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007. (Acceptance rate: 20\

    Google Scholar 

  6. Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.

    Google Scholar 

  7. T. Sohn, A. Varshavsky, A. LaMarca, M. Y. Chen, T. Choudhury, I. Smith, S. Consolvo, J. Hightower, W. G. Griswold, and E. de Lara, “Mobility detection using everyday gsm traces,” in UbiComp, September 2006, pp. 212–224.

    Google Scholar 

  8. K. Muthukrishnan, M. Lijding, N. Meratnia, and P. Havinga, “Sensing motion using spectral and spatial analysis of wlan rssi,” in EuroSSC, October 2007.

    Google Scholar 

  9. J. Krumm and E. Horvitz, “Locadio: inferring motion and location from wi-fi signal strengths,” in MOBIQUITOUS, Aug 2004, pp. 4–13.

    Google Scholar 

  10. K. Kleisouris, Y. Chen, J. Yang, and R. P. Martin, “The impact of using multiple antennas on wireless localization,” in Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 2008.

    Google Scholar 

  11. R. Redner and H. Walker, “Mixture Densities, Maximum Likelihood and the EM Algorithm,” SIAM Review, vol. 26, p. 19–5, 1984.

    Article  MathSciNet  Google Scholar 

  12. R. C. Gonzalez and R. E. Woods, Digital Image Processing. Prentice Hall, 2007.

    Google Scholar 

  13. N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 9, no. 1, pp. 62–66, 1979.

    Article  MathSciNet  Google Scholar 

  14. K. Fukunaga, Introduction to Statistical Pattern Recognition. Academic Press, 1990.

    Google Scholar 

  15. M. Mancas, B. Gosselin, and B. Macq, “Segmentation using a region-growing thresholding,” in Proc. SPIE, vol. 5672, 2005, pp. 388–398.

    Google Scholar 

  16. F. Scheid, Schaum’s Outline of Theory and Problems of Numerical Analysis. McGraw-Hill, 1989.

    Google Scholar 

  17. Y. Chen, J.-A. Francisco, W. Trappe, and R. P. Martin, “A practical approach to landmark deployment for indoor localization,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON), September 2006.

    Google Scholar 

  18. I. Miller and J. Freund, “Probability and statistics for engineers,” PRENTICE-HALL, INC., ENGLEWOOD CLIFFS, NJ 07632(USA), 1984, 530, 1984.

    Google Scholar 

  19. G. Casella, R. Berger, and R. Berger, Statistical inference. Duxbury Press Belmont, Calif, 1990.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yingying Chen .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Yang, J., Chen, Y., Trappe, W., Cheng, J. (2014). Detecting Mobile Agents Using Identity Fraud. In: Pervasive Wireless Environments: Detecting and Localizing User Spoofing. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-07356-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07356-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07355-2

  • Online ISBN: 978-3-319-07356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics