{"title":"A Novel Scheme for Multiple Spoof Attack Detection and Localization on WSN-based Home Security System","authors":"Ulya Sabeel, N. Chandra, S. Dagadi","doi":"10.1109/CICN.2013.81","DOIUrl":null,"url":null,"abstract":"Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the adhoc nature and openness of wireless sensor networks, they are susceptible to the identity based attacks like spoofing. The traditional approach to address spoofing attacks is to apply cryptographic authentication, spatial signatures etc. This suffers from the disadvantages of overhead, limited power, bandwidth and other resources available along with the high costs of implementation. In this paper, we have proposed a method named Attack Detection and Localization Scheme (ADLS) to detect and localize the identity-based attacks. An improved algorithm for hashing has also been proposed. We named it as Effective Hashing Technique (EHT). It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes. With the help of this method we can robustly identify the adversaries and localize them to prevent further large scale network malicious attacks like DoS and resource depletion attacks. We present our simulation for 802.15.4 (Zigbee) based real time home security system and analyse its performance based on NS2.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2013.81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the adhoc nature and openness of wireless sensor networks, they are susceptible to the identity based attacks like spoofing. The traditional approach to address spoofing attacks is to apply cryptographic authentication, spatial signatures etc. This suffers from the disadvantages of overhead, limited power, bandwidth and other resources available along with the high costs of implementation. In this paper, we have proposed a method named Attack Detection and Localization Scheme (ADLS) to detect and localize the identity-based attacks. An improved algorithm for hashing has also been proposed. We named it as Effective Hashing Technique (EHT). It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes. With the help of this method we can robustly identify the adversaries and localize them to prevent further large scale network malicious attacks like DoS and resource depletion attacks. We present our simulation for 802.15.4 (Zigbee) based real time home security system and analyse its performance based on NS2.