2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks 2009
DOI: 10.1109/sahcn.2009.5168926
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Spoofing Attacks in Mobile Wireless Environments

Abstract: Abstract-The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. Identity-based spoofing attacks are serious network threats as they can facilitate a variety of advanced attacks to undermine the normal operation of networks. However, the existing mechanisms can only detect spoofing attacks when the victim node and the spoofing node are static. In this paper, we propose a method for detecting spoofing attacks in the mobile wireless environment, that is when … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(20 citation statements)
references
References 20 publications
(34 reference statements)
0
20
0
Order By: Relevance
“…Data are gathered through a grid of multiple sensors and then processed to fingerprint stations and identify them. A similar approach is taken in [4,3,15,14], where the probability density fuction of the signal power is used to identify and locate single stations in a multiple sensors environment. The last two approaches are indeed innovative but heavier from a computational point of view.…”
Section: Wireless Signal Characterization and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Data are gathered through a grid of multiple sensors and then processed to fingerprint stations and identify them. A similar approach is taken in [4,3,15,14], where the probability density fuction of the signal power is used to identify and locate single stations in a multiple sensors environment. The last two approaches are indeed innovative but heavier from a computational point of view.…”
Section: Wireless Signal Characterization and Related Workmentioning
confidence: 99%
“…Meanwhile WiFi technology has developed to include innovations, such as per-device multiple antennas, that make some of these methods obsolete and useless in practice [11]. The problem has been approached from two different angles, one based on mechanisms or techniques that operate at a logic level [12,9] and one relying on features related to the physical medium, like signal power or Round Trip Time (RTT) [7,8,6,14,4,3,15], which are unspoofable (or nearly impossible to spoof). Signal power analysis is therefore a natural choice for a method to detect MAC-spoof.…”
Section: Introductionmentioning
confidence: 99%
“…However, in the mobile ad hoc network, there is no need for an adversary to gain the physical access to visit the network: once the adversary is in the radio range of any other nodes in the mobile ad hoc network, it can communicate with those nodes in its radio range and thus freedom to join, leave and move inside the network automatically. Thus, the mobile ad hoc network does not provide secure boundary to protect the network from some potentially dangerous network accesses [8], [9].…”
Section: Lack Of Secure Boundariesmentioning
confidence: 99%
“…And node should include the 2-hop neighbors in the hello message; this gives every node a 3-hop topology of the network. But it is defeated by spoofing outside of 3-hops [8].…”
Section: Spoofing Attackmentioning
confidence: 99%
“…Choosing a group of algorithms employing RSS to perform the task of localizing multiple attackers and evaluate their performance in terms of localization accuracy. J.Yang et al, [13] proposed a technique DEtecting Mobile Spoofing aTtacks in wireless Environments (DEMOTE). They develop the DEMOTE system, which exploits Received Signal Strength (RSS) traces collected over time and achieves an optimal threshold to partition the RSS traces into classes for attack detection.…”
Section: Introductionmentioning
confidence: 99%