Abstract
Attacks involving identity fraud can facilitate a variety of advanced attacks to significantly impact the normal operation of wireless networks (F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points vulnerabilities to dos attacks in 802.11 networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004; J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proceedings of the USENIX Security Symposium, 2003, pp. 15–28; D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006; Q. Li andW. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006). Identity fraud performed by mobile wireless devices may further inflict security and privacy damages on the social life of the individual who carries wireless devices. We call these kind of attacks as mobile spoofing attacks. There has been active work in detecting spoofing attacks (D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006; Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007. (Acceptance rate: 20%); Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008). D. Faria and D. Cheriton, (“Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006) proposed the use of matching rules of Received Signal Strength (RSS) for spoofing detection, (Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007. used K-means cluster analysis of RSS, and (Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.) modeled RSS readings as a Gaussian mixture model to capture antenna diversity. However, these mechanisms only work in static wireless environments, i.e., the victim node has a fixed location. In this chapter, we focus on spoofing attack detection in mobile wireless environments, that is, the wireless devices including the victim node and/or the spoofing node are moving around. Thus, detecting identity fraud launched by mobile agents is important as it allows the network to further exploit a wide range of defense strategies in different network layers, and consequently helps to ensure secure and trustworthy communication in emerging mobile pervasive computing.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access points vulnerabilities to dos attacks in 802.11 networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004.
J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proceedings of the USENIX Security Symposium, 2003, pp. 15–28.
D. Faria and D. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006.
Q. Li and W. Trappe, “Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), September 2006.
Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wirelss spoofing attacks,” in Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), May 2007. (Acceptance rate: 20\
Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC layer spoofing using received signal strength,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), April 2008.
T. Sohn, A. Varshavsky, A. LaMarca, M. Y. Chen, T. Choudhury, I. Smith, S. Consolvo, J. Hightower, W. G. Griswold, and E. de Lara, “Mobility detection using everyday gsm traces,” in UbiComp, September 2006, pp. 212–224.
K. Muthukrishnan, M. Lijding, N. Meratnia, and P. Havinga, “Sensing motion using spectral and spatial analysis of wlan rssi,” in EuroSSC, October 2007.
J. Krumm and E. Horvitz, “Locadio: inferring motion and location from wi-fi signal strengths,” in MOBIQUITOUS, Aug 2004, pp. 4–13.
K. Kleisouris, Y. Chen, J. Yang, and R. P. Martin, “The impact of using multiple antennas on wireless localization,” in Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 2008.
R. Redner and H. Walker, “Mixture Densities, Maximum Likelihood and the EM Algorithm,” SIAM Review, vol. 26, p. 19–5, 1984.
R. C. Gonzalez and R. E. Woods, Digital Image Processing. Prentice Hall, 2007.
N. Otsu, “A threshold selection method from gray-level histograms,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 9, no. 1, pp. 62–66, 1979.
K. Fukunaga, Introduction to Statistical Pattern Recognition. Academic Press, 1990.
M. Mancas, B. Gosselin, and B. Macq, “Segmentation using a region-growing thresholding,” in Proc. SPIE, vol. 5672, 2005, pp. 388–398.
F. Scheid, Schaum’s Outline of Theory and Problems of Numerical Analysis. McGraw-Hill, 1989.
Y. Chen, J.-A. Francisco, W. Trappe, and R. P. Martin, “A practical approach to landmark deployment for indoor localization,” in Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON), September 2006.
I. Miller and J. Freund, “Probability and statistics for engineers,” PRENTICE-HALL, INC., ENGLEWOOD CLIFFS, NJ 07632(USA), 1984, 530, 1984.
G. Casella, R. Berger, and R. Berger, Statistical inference. Duxbury Press Belmont, Calif, 1990.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Yang, J., Chen, Y., Trappe, W., Cheng, J. (2014). Detecting Mobile Agents Using Identity Fraud. In: Pervasive Wireless Environments: Detecting and Localizing User Spoofing. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-07356-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-07356-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07355-2
Online ISBN: 978-3-319-07356-9
eBook Packages: Computer ScienceComputer Science (R0)