Title :
A Novel Scheme for Multiple Spoof Attack Detection and Localization on WSN-based Home Security System
Author :
Sabeel, Ulya ; Chandra, Nagasuma ; Dagadi, Shivraj
Author_Institution :
Dept. of Comput. Sci. & Technol., Amity, Noida, India
Abstract :
Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due to the adhoc nature and openness of wireless sensor networks, they are susceptible to the identity based attacks like spoofing. The traditional approach to address spoofing attacks is to apply cryptographic authentication, spatial signatures etc. This suffers from the disadvantages of overhead, limited power, bandwidth and other resources available along with the high costs of implementation. In this paper, we have proposed a method named Attack Detection and Localization Scheme (ADLS) to detect and localize the identity-based attacks. An improved algorithm for hashing has also been proposed. We named it as Effective Hashing Technique (EHT). It generates the Hash keys to differentiate an attacker from a normal node and to reduce the occurrences of any false positives or negatives. Also, our localization algorithm efficiently finds out the position estimates for the nodes. With the help of this method we can robustly identify the adversaries and localize them to prevent further large scale network malicious attacks like DoS and resource depletion attacks. We present our simulation for 802.15.4 (Zigbee) based real time home security system and analyse its performance based on NS2.
Keywords :
cryptography; telecommunication security; wireless sensor networks; ADLS; EHT; WSN based home security system; attack detection and localization scheme; cryptographic authentication; effective hashing technique; malicious attacks; multiple spoof attack detection; multiple spoof attack localization; spatial signatures; wireless sensor networks; Algorithm design and analysis; Clustering algorithms; Cryptography; Performance evaluation; Real-time systems; Wireless sensor networks; Identity based attacks; Spoofing attack; Wireless sensor networks; attack detection; localization;
Conference_Titel :
Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on
Conference_Location :
Mathura
DOI :
10.1109/CICN.2013.81