IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10...

20
S.P.Deshpande, Krishna Hukkeri et al IJMEIT Volume 2 Issue 6 June 2014 Page 346 IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x [2014] Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Authors S.P .Deshpande 1 , Krishna Hukkeri 2 1 Asst Prof, Department of Electronics and Communication Engineering,Gogte Institute of Technology Belgaum 2 Student,Department of Electronics and Communication Engineering,Gogte Institute of Technology Belgaum Email-[email protected],[email protected] Abstract Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. We evaluate our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries. Index TermsWireless network security, spoofing attack , attack detection , localization.

Transcript of IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10...

Page 1: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 346

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

Detection and Localization of Multiple Spoofing Attackers in Wireless

Networks

Authors

S.P .Deshpande1 , Krishna Hukkeri

2

1Asst Prof, Department of Electronics and Communication Engineering,Gogte Institute of Technology Belgaum

2Student,Department of Electronics and Communication Engineering,Gogte Institute of Technology

Belgaum

[email protected],[email protected]

Abstract

Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks.

Although the identity of a node can be verified through cryptographic authentication, conventional

security approaches are not always desirable because of their overhead requirements. In this paper, we

propose to use spatial information, a physical property associated with each node, hard to falsify, and

not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of

attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple

adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from

wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number

of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine

the number of attackers. We evaluate our techniques through two testbeds using both an 802.11 (WiFi)

network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show

that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the

number of attackers. Our localization results using a representative set of algorithms provide strong

evidence of high accuracy of localizing multiple adversaries.

Index Terms—Wireless network security, spoofing attack , attack detection , localization.

Page 2: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 347

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

1. INTRODUCTION

Due to the openness of the wireless transmission

medium, adversaries can monitor any transmission.

Further, adversaries can easily purchase low-

cost wireless devices and use these commonly

available platforms to launch a variety of attacks

with little effort. Among various types of

attacks, identity-based spoofing attacks are

especially easy to launch and can cause significant

damage to network performance.

Spoofing attacks can further facilitate a variety of

traffic injection attacks [1], [2], such as attacks on

access control lists, rogue access point (AP)

attacks, and eventually Denial-of-Service (DoS)

attacks. A broad survey of possible spoofing attacks

can be found in [3], [4]. In a large-scale network,

multiple adversaries may masquerade as the same

identity and collaborate to launch malicious attacks

such as network resource utilization attack

and denial-of-service attack quickly. Therefore, it is

important to

1) detect the presence of spoofing attacks,

2) determine the number of attackers, and

3)localize multiple adversariesn and

eliminate them. Most existing approaches to address

potential spoofing attacks employ cryptographic

schemes [5], [6]. However, the application of

cryptographic schemes requires reliable key

distribution, management, and maintenance

mechanisms. It is not always desirable to apply

these cryptographic methods because of its

infrastructural, computational, and management

overhead. Further, cryptographic methods are

susceptible to node compromise, which is a serious

concern as most wireless nodes are easily

accessible, allowing their memory to be easily

scanned. In this work, we propose to use received

signal strength (RSS)-based spatial correlation, a

physical property associated with each wireless

node that is hard to falsify and not reliant on

cryptography as the basis for detecting spoofing

attacks. Since we are concerned with attackers who

have different locations than legitimate wireless

nodes, utilizing spatial information to address

spoofing attacks has the unique power to not only

identify the presence of these attacks but also

localize adversaries. An added advantage of

employing spatial correlation to detect spoofing

attacks is that it will not require any additional cost

or modification to the wireless devices themselves.

We focus on static nodes in this work, which are

common for spoofing scenarios [7]. We addressed

spoofing detection in mobile environments in our

other work [8]. The works that are closely related to

us are [3], [7], [9]. Sheng et al. [7] modeled the RSS

readings using a Gaussian mixture model and Chen

et al. [9] used RSS and K-means cluster analysis to

detect spoofing attacks. However, none of these

approaches have the ability to determine the number

of attackers when multiple adversaries use the same

identity to launch attacks, which is the basis to

further localize multiple adversaries after attack

detection. Although Chen et al. [9] studied how to

localize adversaries, it can only handle the case of a

single spoofing attacker and cannot localize the

attacker if the adversary uses different transmission

power levels.

The main contributions of our work are:

Page 3: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 348

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

1) GADE: a generalized attack detection model

(GADE) that can both detect spoofing attacks as

well as determine the number of adversaries

using cluster analysis methods grounded

onRSS-based spatial correlations among normal

devices and adversaries;

2) IDOL: an integrated detection andlocalization

system that can both detect attacks as well as

find the positions of multiple adversaries even

when the adversaries vary their transmission

power levels.

In GADE, the Partitioning Around Medoids (PAM)

cluster analysis method is used to perform attack

detection. We formulate the problem of determining

the number of attackers as a multiclass detection

problem. We then applied cluster-based methods to

determine the number of attacker. We further

developed a mechanism called SILENCE for testing

Silhouette Plot and System Evolution with

minimum distance of clusters, to improve the

accuracy of determining the number of attackers.

Additionally, when the training data are available,

we propose to use the Support Vector Machines

(SVM) method to further improve the accuracy of

determining the number of attackers .Moreover, we

developed an integrated system, IDOL, which

utilizes the results of the number of attackers

returned by GADE to further localize multiple

adversaries.

2. RELATED WORK

The traditional approach to prevent spoofing attacks

is to usecryptographic-based authentication [5], [6],

[10]. Wu et al. [5] have introduced a secure and

efficient key management (SEKM) framework.

SEKM builds a Public Key Infrastruc- ture (PKI) by

applying a secret sharing scheme and an underlying

multicast server group. Wool [6] implemented a key

management mechanism with periodic key refresh

and host revocation to prevent the compromise of

authentication keys. An authentication framework

for hierarchical, ad hoc sensor networks is proposed

in [10]. However, the crypto- graphic authentication

may not be always applicable because of the limited

resources on wireless devices, and lacking of a fixed

key management infrastructure in the wireless

network.

Recently, new approaches utilizing physical

properties associated with wireless transmission to

combat attacks in wireless networks have been

proposed. Based on the fact that wireless channel

response decorrelates quite rapidly in space,

a channel-based authentication scheme was

proposed to discriminate between transmitters at

different locations, and thus to detect spoofing

attacks in wireless networks [11]. Brik et al. [12]

focused on building fingerprints of 802.11b WLAN

NICs by extracting radiometric signatures, such as

frequency magnitude, phase errors, and I/Q origin

offset, to defend against identity attacks. However,

there is additional overhead associated with wireless

channel response and radiometric signature

extraction in wireless networks. Li and Trappe [4]

introduced a security layer that used forge- resistant

relationships based on the packet traffic, including

MAC sequence number and traffic pattern, to detect

spoofing attacks. The MAC sequence number has

Page 4: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 349

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

also been used in [13] to perform spoofing

detection. Both the sequence number and the traffic

pattern can be manipulated by an adversary as long

as the adversary learns the traffic pattern under

normal conditions.

The works [3], [7], [14] using RSS to defend against

spoofing attacks are most closely related to us. Faria

and Cheriton [3] proposed the use of matching rules

of signalprints for spoofing detection. Sheng et al.

[7] modeled the RSS readings using a Gaussian

mixture model. Sang and Arora [14] proposed to

use the node’s “spatial signature,” including

Received Signal Strength Indicator (RSSI) and Link

Quality Indicator (LQI) to authenticate messages in

wireless networks. However, none of these

approaches are capable of determining the number

of attackers when there are multiple adversaries

collaborating to use the same identity to launch

malicious attacks. Further, they do not have the

ability to localize the positions of the adversaries

after attack detection.

Turning to studying localization techniques, in spite

of its several meter-level accuracy, using RSS [15],

[16], [17], [18] is an attractive approach because it

can reuse the existing wireless infrastructure and is

highly correlated with physical locations. Dealing

with ranging methodology, range-basedalgorithms

involve distance estimation to land- marks using the

measurement of various physical properties such as

RSS [15], [16], Time Of Arrival (TOA) [19], Time

Difference Of Arrival (TDOA), and direction of

arrival (DoA) [20]. Whereas range-free algorithms

[21] use coarser metrics to place bounds on

candidate positions. Another method of

classification describes the strategy used to map a

node to a location. Lateration approaches [19] use

distances to landmarks, while angulation uses the

angles from landmarks. Scene matching strategies

[15] use a function that maps observed radio

properties to locations on a preconstructed signal

map or database.

Our work differs from the previous study in that we

use the spatial information to assist in attack

detection instead of relying on cryptographic-

based approaches. Further- more, our work is novel

because none of the exiting work can determine the

number of attackers when there are multiple

adversaries masquerading as the same identity.

Additionally, our approach can accurately localize

multiple adversaries even when the attackers

varying their transmis- sion power levels to trick the

system of their true locations.

3. GENERALIZED ATTACK DETECTION

MODEL

In this section, we describe our Generalized

Attack Detection ModEl, which consists of two

phases: attack detection, which detects the presence

of an attack, and number determination, which

determines the number of adversaries.

3.1 Theoretical Analysis of the Spatial

Correlation of RSS

We propose to study RSS, a property closely

correlated with location in physical space and is

readily available in the existing wireless networks.

Although affected by random noise, environmental

bias, and multipath effects, the RSS measured at a

Page 5: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 350

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

set of landmarks (i.e., reference points with known

locations) is closely related to the transmitter’s

physical location and is governed by the distance to

the landmarks [17]. The RSS readings at the same

physical location are similar, whereas the RSS

readings at different locations in physical space are

distinctive. Thus, the RSS readings present strong

spatial correlation characteristics

We define the RSS value vector as s = {s1, s2,

s3……sn } where n is the number of

landmarks/access points that are monitoring the

RSS of the wireless nodes and know their locations.

Generally, the RSS at the ith landmark from a

wireless node is lognormally distributed [23]

(1)

where P(d0) represents the transmitting power of

the node at the reference distance d0, dj is the

distance between the wireless node j and the ith

landmark, and is the path loss exponent, Xi is the

shadow fading which follows zero mean Gaussian

distribution with standard deviation [23], [24].

For simplicity, we assume the wireless nodes have

the same transmission power. Given two wireless

nodes in the physical space, the RSS distance

between two nodes in signal space at the ith

landmark is given by

(2)

where follows zero mean Gaussian distribution

with standard deviation.

The square of RSS distance in n-

dimensional signal space (i.e., at n landmarks) is

then determined by

(3)

Where with i =1,2, …. n is the RSS distance

at ith landmark and is given by (3)

Based on (2) and (3), we know that, when these

two wireless nodes are at the same location, the

distance in n dimension signal space

follows a central chi-square with n degree of

freedom [25]. The probability density functions

(PDF) of the random variable , which is

the square distance in n- dimensional signal space,

when two wireless nodes are at the same location

can be represented as

(4)

where and denotes the Gamma

function, which has closed-form values at the half-

integers

However, when these two wireless nodes are at

different locations, becomes a non

central chi-square distribution with n degree

of freedom and a non centrality parameter , where

(5)

and dij, with i = 1, 2, . . . n , j=1, 2, is the distance

from jth wireless nodes to the ith landmark. The

Page 6: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 351

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

PDF of the random variable X = D2 when two

wireless node are at the different locations can be

represented as

(6)

3.2Attack Detection Using Cluster Analysis

The above analysis provides the theoretical support

of using the RSS-based spatial correlation inherited

from wireless nodes to perform spoofing attack

detection. It also showed that the RSS readings from

a wireless node may fluctuate and should cluster

together. In particular, the RSS readings over time

from the same physical location will belong to the

same cluster points in the n-dimensional signal

space, while the RSS readings from different

locations over time should form different clusters in

signal space. Under the spoofing attack, the victim

and the attacker are using the same ID to transmit

data packets, and the RSS readings of that ID is the

mixture readings measured from each individual

node (i.e., spoofing node or victim node). Since

under a spoofing attack, the RSS readings from the

victim node and the spoofing attackers are mixed

together, this observation suggests that we may

conduct cluster analysis on top of RSS-based spatial

correlation to find out the distance in signal space

and further detect the presence of spoofing attackers

in physical space.

In this work, we utilize the Medoids Method to

perform clustering analysis in RSS.

3.2.1 Medoids:-

Medoids are representative objects of a data set or

a cluster with a data set whose average dissimilarity

to all the objects in the cluster is minimal. Medoids

are similar in concept to means or centroids, but

medoids are always members of the data set.

A common application of the medoid is the k-

medoids clustering algorithm, which is similar to

the k-means algorithm but works when a mean or

centroid is not definable.

This algorithm basically works as follows.

1. A set of medoids is chosen at random.

2. The distances to the other points are

computed.

3. Data are clustered according to the medoid

they are most similar to.

4. The medoid set is optimized via an iterative

process.

k-medoids :-

The k-medoids,algorithm is

a clustering algorithm related to the k

means algorithm and the medoidshift algorithm.

Both the k-means and k-medoids algorithms are

partitional (breaking the dataset up into groups) and

both attempt to minimize the distance between

points labeled to be in a cluster and a point

designated as the center of that cluster.

k-medoid is a classical partitioning technique of

clustering that clusters the data set of n objects

into k clusters known a priori. It is more robust to

noise and outliers as compared to k-means because

it minimizes a sum of pairwise dissimilarities

Page 7: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 352

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

instead of a sum of squared Euclidean distances.

A medoid can be defined as the object of a cluster,

whose average dissimilarity to all the objects in the

cluster is minimal i.e. it is a most centrally located

point in the cluster.

1. The most common realisation of k-medoid

clustering is the Partitioning Around Medoids

(PAM) algorithm and is as follows : Initialize:

randomly select k of the n data points as the

medoids

2. Associate each data point to the closest

medoid. ("closest" here is defined using any

valid distance metric, most commonly Euclidean

distance, Manhattan distance .

Demonstration of PAM

Cluster the following data set of ten objects into

two clusters i.e. k = 2.

Consider a data set of ten objects as follows:

Step 1

Initialize k centers.

Let us assume c1 = (3,4) and c2 = (7,4)

So here c1 and c2 are selected as medoids.

Calculate distance so as to associate each data

object to its nearest medoid. Cost is calculated

using Manhattan,distance(Minkowski.distance metri

c with r = 1). Costs to the nearest medoid are shown

bold in the table.

X1 2 6

X2 3 4

X3 3 8

X4 4 7

X5 6 2

X6 6 4

X7 7 3

X8 7 4

X9 8 5

X10 7 6

Page 8: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 353

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

Fig 1: cluster formation by using partition method then the clusters become:

i ci Data object Cost

(distance)

1 3 4 2 6 3

3 3 4 3 8 4

4 3 4 4 7 4

5 3 4 6 2 5

6 3 4 6 4 3

7 3 4 7 3 5

9 3 4 8 5 6

10 3 4 7 9 6

i ci Data

object

Cost

(distance)

1 7 4 2 6 7

3 7 4 3 8 8

4 7 4 4 7 6

5 7 4 6 2 3

6 7 4 6 4 1

7 7 4 7 3 1

9 7 4 8 5 2

10 7 4 7 6 2

Page 9: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 354

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

Cluster1 = {(3,4)(2,6)(3,8)(4,7)}

Cluster2 = {(7,4)(6,2)(6,4)(7,3)(8,5)(7,6)}

Since the points (2,6) (3,8) and (4,7) are closer

to c1 hence they form one cluster whilst remaining

points form another cluster.

So the total cost involved is 20.

Where cost between any two points is found using

formula

(7)

where x is any data object, c is the medoid, and d is

the dimension of the object which in this case is 2.

Total cost is the summation of the cost of data

object from its medoid in its cluster so here:

3.3Attack detection

The PAM Method [26] is a popular iterative descent

clustering algorithm. Compared to the popular K-

means method [9], the PAM method is more robust

in the presence of noise and outliers. Thus, the PAM

method is more suitable in determining clusters

from RSS streams, which can be unreliable and

fluctuating over time due to random noise and

environmental bias [27].

We thus formulate spoofing detection as a

statistical significance testing problem, where the

null hypothesis is

Ho : normal (no spoofing attac).

In significance testing, a test statistic T is used to

evaluate whether observed data belong to the null-

hypothesis or not. In particular, in our attack

detection phase, we partition the RSS vectors from

the same node identity into two clusters (i.e., K = 2)

no matter how many attackers are using this

identity, since our objective in this phase is to detect

the presence of attacks. We then choose the distance

between two medoids Dm as the test statistic T in

our significance testing for spoofing

detection, Dm = ||Mi –Mj||, where Mi and Mj are the

medoids of two clusters. Under normal conditions,

the test statistic Dm should be small since there is

basically only one cluster from a single physical

location. However, under a spoofing attack, there is

more than one node at different physical locations

claiming the same node identity. As a result, more

than one clusters will be formed in the signal space

and Dm will be large as the medoids are derived

from the different RSS clusters associated with

different locations in physical space.

Our approach in handling attacks using different

transmission power levels or transmission time , we

collected packets at varying transmission power

levels or transmission time of original node and

spoofing node . We randomly chose point

combinations on the floor and treated one point as

the position of the original node, and the rest as the

positions of the spoofing nodes. Then, we ran tests

Page 10: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 355

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

through all the possible combinations of testing

points for cases of two, three, and four attackers

masquerading as a single node identity.

If a spoofing attacker sends packets at a different

transmison time from the original node, based on

our cluster analysis there will be two distinct RSS

clusters in signal space (i.e., Dm will be large). The

varied transmission time for an attacker

from original node. We found that in all

cases Dm is larger than normal conditions. In

network when the spoofing attacker used different

transmission time from original node

transmission time to send packets .Thus, spoofing

attacks launched by using different transmission

power levels will be detected effectively in GADE.

Fig. 2. Landmark setups and testing locations in two

networks within two

3.4 Evaluation Strategy

To test the performance of our attack detection

approach we evaluate our approach in real

office building environ- ments. We conducted

experiments in two office buildings one is the

Wireless Information Network Laboratory

(WINLAB) using an 802.11 (WiFi) network

and the other is the Computer Science

Department at Rutgers University using an

802.15.4 (ZigBee) network as presented in Fig.

4. The wireless devices we consider here are

a Dell laptop running Linux and equipped

with an Orinoco silver card (for the 802.11

network) and a Tmote Sky mote (for the

802.15.4 network). The size of these two floors

are 219 ft 169 ft and 200 ft 80 ft, respectively.

Fig. 4a shows five landmarks in red stars in the

802.11 networks to maximize the coverage,

whereas there are four landmarks deployed as

red triangles in the 802.15.4 network to

achieve optimal landmark placement [17],. We

note that the deployment of landmarks has

important impact on the detection

performance, which is similar to the

wireless localization [17]. Each landmark is

a Linux machine equipped with a Atheros

miniPCI 802.11 wireless card and a Tmote

Sky mote so as to measure the RSS readings

from both WiFi and Zigbee networks. The small

dots in the floor maps are the locations used for

testing. There are 101 locations for the 802.11

network and 94 locations for the 802.15.4

network. At each location, 300 packet-level

RSS samples are collected separately during the

daytime when there were people walking

around. Further, to evaluate the robustness

of our approach in handling attacks using

different transmission power levels, we

collected packets at varying transmission power

levels from 30 mW (15 dBm) to 1 mW (0 dBm)

Page 11: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 356

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

for the 802.11 network. We randomly chose

point combinations on the floor and treated

one point as the position of the original node, and

the rest as the positions of the spoofing nodes.

Then, we ran tests through all the possible

combinations of testing points for cases of

two, three, and four attackers masquerading

as a single node identity. In addition, we

built an integrated system to both detect

attacks as well as localize the positions of

adversaries. We use the leave-one-out

method in localization algorithms, which

means we choose one location as the testing

node whereas the rest of the locations as

training data till all the locations have been

tested. The experimental results will be

presented in the following sections,

respectively.

4 DETERMINING THE NUMBER

OF ATTACKERS

After detecting the presence of a attack, the next

phase is to determine the number of attackers,

using the same node identity to launch spoofing

attacks, so that we can further localize the

multiple adversaries and eliminate them. We first

describe how to measure the accuracy when

determining the number attackers. We then present

two mechanisms, Silhouette Plot and System

Evolution. Next, we describe the SILENCE

mechanism that we developed which performs an

evaluation based on minimum cluster distance on

top of the cluster. analysis to improve the accuracy

of determing number of attackers.

4.1Problem Formulation

Inaccurate estimation of the number of attackers

will cause failure in localizing the multiple

adversaries. As we do not know how many

adversaries will use the same node identity to

launch attacks, determining the number of attackers

becomes a multiclass detection problem and is

similar to determining how many clusters exist in

the RSS readings. If C is the set of all classes, i.e.,

all possible combination of number of attackers. For

instance, C ={1,2, 3, }. For a class of specific

number of attackers ci, e.g., ci = 3, we define Pi as

the positive class of ci and all other classes (i.e., all

other number of attackers) as negative class Ni

(8)

(9)

4.2Silhouette Plot

A new graphical display is proposed for partitioning

techniques. Each cluster is represented by a so-

called silhouette, which is based on the comparison

of its tightness and separation. This silhouette shows

which objects lie well within their cluster, and

which ones are merely somewhere in between

clusters. The entire clustering is displayed by

combining the silhouettes into a single plot,

allowing an appreciation of the relative quality of

the clusters and an overview of the data

configuration.

Page 12: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 357

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

4.2.1 Construction of silhouettes

The silhouettes constructed below are useful when

the proximities are on a ratio scale (as in the case of

Euclidean distances) and when one is seeking

compact and clearly separated clusters. Indeed, the

definition makes use of average proximities as in

the case of group average linkage,

which is known to work best in a situation with

roughly spherical clusters.

In order to construct silhouettes, we only need two

thingst the partition we have obtained (by

the application of some clustering technique) and

the collection of all proximities between

objects. For each object i we will introduce a certain

value s(i), and then these numbers are

combined into a plot.

Let us first define the numbers s(i) in the case of

dissimilarities. Take any object i in the data set, and

denote by A the cluster to which it has been

assigned. (For a concrete illustration, see Fig. 1).

When cluster A contains other objects apart from i,

then we can compute

a(i) = average dissimilarity of i to all other objects

of A.

In Fig. 1, this is the average length of all lines

within A. Let us now consider any cluster C which

is different from A, and compute

d(i, C) = average dissimilarity of i to all objects of

C.

In Fig. I, this is the average length of all lines going

from i to C. After computing d(i, C) for all

clusters C A, we select the smallest of those

numbers and denote it by

Fig. 3. An illustration of the elements involved in

the computation of s(i), where the object i belongs

lo cluster A.

The cluster B for which this minimum is attained

(that is. d(i. B) = b(i)) we call the neighbor of object

i. This is like the second-best choice for object it if

it could not he accommodated into cluster A, which

cluster B would be the closest competitor‘? In Fig.

3. cluster B indeed appears to be ‘closest’ (on the

average) to object i, when A itself is discarded.

Therefore. it is very useful to know the neighbor of

each object in the data set. Note that the

construction of b(i) depends on the availability of

other clusters apart from A, so we have to assume

throughout this paper that the number of clusters k

is more than one.

The number s(i) is obtained by combining a(i) and

b(i) as follows:

Page 13: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 358

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

(9)

It is even possible to write this in one formula:

(10)

When cluster A contains only a single object it is

unclear how a(i) should be defined, and then we

simply set s(i) equal to zero. This choice is of

course arbitrary, but a value of zero appears to be

most neutral. Indeed, from the above definition we

easily see that

for each object i.

Note that the s(i) defined above remains invariant

when all the original dissimilarities are multiplied

by a positive constant, but that an additive constant

is not allowed. Th.is explains why we have

explicitly assumed that the dissimilarities were on a

ratio scale, which means that a dissimilarity of 6

may be considered twice as large as a dissimilarity

of 3. For instance, Euclidean distances are on a ratio

scale.

To strengthen our intuition about the meaning of

s(i), let us look at a few extreme situations. When

s(i) is at its largest (that is, .v(i) close to 1) this

implies that the ‘within’ dissimilarity a(i) is much

smaller than the smallest ‘between’ dissimilarity

l2(i). Tlierefore, we can say that i is ‘well-

clustered’, as there appears to be little doubt that i

has been assigned to a very appropriate cluster: the

second-best choice (B) is not nearly as close as the

actual choice (A).

A different situation occurs when s(i) is

about zero. Then a(i) and h(i) are approximately

equal, and hence it is not clear at all whether 1'

should have been assigned to either A or B. Object i

lies equally far away from both, so it can be

considered as an ‘intermediate case’. The worst

situation takes place when s(i) is close to — l. Then

a(i) is much larger than b(i), so i lies on the average

much closer to B than to A. Therefore it would have

seemed much more natural to assign object i to

cluster B, so we can almost conclude that this object

has been ‘ misclassified’.

To conclude, s(i) measures how well object i

matches the clustering at hand (that is, how well it

has been classified). In the special case where there

are only two clusters (k = 2), we note that shifting

object i from one cluster to the other will convert

s(i) to —s(i).

4.3 The System Evolution

The System Evolution is a new method to analyze

cluster structures and estimate the number of

clusters [32]. The System Evolution method uses

the twin-cluster model, which are the two closest

clusters (e.g., clusters a and b) among K-potential

clusters of a data set. The twin-cluster model is used

for energy calculation. The Partition

Energy Ep(K) denotes the border distance between

the twin clusters, whereas the Merging

Page 14: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 359

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

Energy Em(K) is calculated as the average distance

between elements in the border region of the twin

clusters. The border region includes a number of

sample points chosen from clusters a and b that are

closer to its twin cluster than any other points within

its own cluster .For instance,if cluster a contains

total Ma sample points,in the twin-cluster model, a

will be partitioned into Da= parts. Then,the

number of sample points in the border region is

defined as na = . The sample rule is carried out

for its twin cluster b. Thus, we compute the

Partition Energy Ep (K) as

(11)

And the Merging Energy Em(K) as

(12)

where D(ai, bj); is the euclidean/Pearson distance

between the elements ai and bj in clusters a and b,

respectively. And Xsi,sj , which

are the elements in the border region of the twin

clusters.

The basic idea behind using the System Evolution

method to determine the number of attackers is that

all the rest of clusters are separated if the twin

clusters are separable. Starting from the initial state

with K = 2, the algorithm works with PAM by

changing the number of clusters in a data set

through the partitioning process Ep(K) > Em(K) and

the merging process Em(K) Ep(K) alternatively.

4.4The SILENCE Mechanism

The advantage of Silhouette Plot is that it is suitable

for estimating the best partition. Whereas the

System Evolution method performs well under

difficult cases such as when there exists slightly

overlapping between clusters and there are smaller

clusters near larger clusters [32]. However, we

observed that for both Silhouette Plot and System

Evolution methods are more difficult to determining

spoofing attack. This is because the clustering

algorithms cannot tell the difference between real

RSS clusters formed by attackers at different

positions and fake RSS clusters caused by outliers

and variations of the signal strength.

Fig. 2 illustrates such a situation where there are

three attackers masquerading the same identity.

Silhouette Plot returns the number of attackers Ks=

4 as shown in Fig. 11a. We found that the minimum

distance between two clusters in Silhouette Plot is

Page 15: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 360

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

very small because two clusters are actually from a

single physical location. Further, Fig. 11b shows

that System Evolution returns the number of

attackersKse = 3, the correct number of attackers,

and the minimum distance between two clusters is

large indicating that the clusters are from different

physical locations.

Based on this observation, we developed SILENCE,

testing SILhouette Plot and System EvolutioN with

mini- mum distanCE of cluster, which evaluates the

minimum distance between clusters on top of the

pure cluster analysis to improve the accuracy of

determining the number of attackers. The number of

attackers K in SILENCE is thus determined by

(13)

where

Dmbs

m is the observed value of Dm between

two clusters.SILENCE takes the advantage of

both Silhouette Plot and System Evolution and

further makes the judgment by checking the

minimum distance between the returned clusters to

makesure the clusters are produced by attackers

instead of RSS variations and outliers. Hence,

when applying SILENCE to the case shown in

Figure 3, SILENCE returns K = 3 as the number

of attackers, which is the true positive in this

example.

5 IDOL:INTEGRATED DETECTION

LOCALIZATION FRAMEWORK

In this section, we present our integrated system that

can both detect spoofing attacks, determine the

number of attackers, and localize multiple

adversaries. The experimen- tal results are presented

to evaluate the effectiveness of our approach,

especially when attackers using different trans-

mission power levels.

5.1Framework

The traditional localization approaches are based on

averaged RSS from each node identity inputs to

estimate the position of a node. However, in

wireless spoofing attacks, the RSS stream of a node

identity may be mixed with RSS readings of both

the original node as well as spoofing nodes from

different physical locations. The traditional method

of averaging RSS readings cannot differentiate RSS

readings from different locations and thus is not

feasible for localizing adversaries.

Different from traditional localization

approaches, our integrated detection and

localization system utilizes the RSS medoids

returned from SILENCE as inputs to localization

algorithms to estimate the positions of adversaries.

The return positions from our system includes the

location estimate of the original node and the

attackers in the physical space.

Handling adversaries using different transmission

power levels. An adversary may vary the

transmission power levels when performing

spoofing attacks so that the localization system

cannot estimate its location accurately. We examine

the pass loss equation that models the received

power as a function of the distance to the landmark:

Page 16: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 361

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

(14)

where P(d0) represents the transmitting power of a

node at the reference distance d0, d is the distance

between the transmitting node and the landmark,

and is the path loss exponent. Further, we can

express the difference of the received power

between two landmarks, i and j, as

(15)

Based on (15), we found that the difference of the

corresponding received power between two

different land- marks is independent of the

transmission power levels. Thus, when an adversary

residing at a physical location varies its

transmission power to perform a spoofing attack,

the difference of the RSS readings between two

different landmarks from the adversary is a constant

since the RSS readings are obtained from a single

physical location. We can then utilize the difference

of the medoids vectors in signal space obtained

from SILENCE to localize adversaries.

5.2Algorithms

In order to evaluate the generality of IDOL for

localizing adversaries, we have chosen a set of

representative localization algorithms ranging from

nearest neighbor matching in signal space (RADAR

[15]), to probability-based (Area-Based Probability

(ABP) [16]), and to multilateration (Bayesian

Networks (BN) [37]).

RADAR-gridded. The RADAR-Gridded algorithm

is ascene-matching localization algorithm extended

from [15].RADAR-Gridded uses an interpolated

signal map, which is built from a set of averaged

RSS readings with known (x,y) locations. Given an

observed RSS reading with an unknown location,

RADAR returns the x, y of the nearest neighbor in

the signal map to the one to localize, where

“nearest” is defined as the euclidean distance of

RSS points in anN-dimensional signal space,

where N is the number of landmarks.

Area-based probability. ABP also utilizes an

interpo- lated signal map [16]. Further, the

experimental area is divided into a regular grid

of equal-sized tiles. ABP assumes the distribution of

RSS for each landmark follows a Gaussian

distribution with mean as the expected value of RSS

reading vector s. ABP then computes the probability

of the wireless device being at each tile Li, with i =1

. . . L, on the floor using Bayes’ rule:

(16)

Given that the wireless node must be at exactly one

tile satisfying P(Li |s)=1, ABP nprmalizes the

probability and retruns the most likely tiles/grids up

to its confidence

Bayesian networks. BN localization is a

multilateration algorithm that encodes the signal-to-

distance propagation model into the Bayesian

Graphical Model for localization [37]. Fig. 4 shows

the basic Bayesian Network used for our study. The

Page 17: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 362

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

vertices X and Y represent location; the vertex si is

the RSS reading from the ith landmark; and the

vertex Direpresents the euclidean distance between

the location specified by X and Y and the ith

landmark. The value of sifollows a signal

propagation model si = b0i +b1i log Di,

whereb0i,b1i are the parameters specific to the ith

landmark.

Fig. 4. Bayesian graphical model in our study

The distance

(17)

in turn depends on the location (X, Y) of the

measured signal and the coordinates (xi, yi) of

the ith landmark. The network models noise and

outliers by modeling the si as a Gaussian

distribution around the above propagation model,

with variance i: si N(b0i +b1i log Di,i). Through

Markov Chain Monte Carlo (MCMC) simulation,

BN returns the sampling distribution of the possible

location of X and Y as the localization result.

6. CONCLUSION

In this work, we proposed to use received signal

strength- based spatial correlation, a physical

property associated with each wireless device that is

hard to falsify and not reliant on cryptography as the

basis for detecting spoofing attacks in wireless

networks. We provided theoretical analysis of using

the spatial correlation of RSS inherited from

wireless nodes for attack detection. We derived the

test statistic based on the cluster analysis of RSS

readings. Our approach can both detect the presence

of attacks as well as determine the number of

adversaries, spoofing the same node identity, so that

we can localize any number of attackers and

eliminate them. Determining the number of

adversaries is a particu- larly challenging problem.

We developed SILENCE, a mechanism that

employs the minimum distance testing in addition to

cluster analysis to achieve better accuracy of

determining the number of attackers than other

methods under study, such as Silhouette Plot and

System Evolution, that use cluster analysis alone.

To validate our approach, we conducted

experiments on two testbeds through both an

802.11network (WiFi) and an 802.15.4 (ZigBee)

network in two real office building environments.

We found that our detection mechanisms are highly

effective in both detecting the presence of attacks

with detection rates over 98 percent and

determining the number of adversaries, achieving

over 90 percent hit rates and precision

simultaneously when using SILENCE and SVM-

basedmechanism. Further, based on the number of

attackers determined by our mechanisms, our

Page 18: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 363

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

integrated detection and localization system can

localize any number of adversaries even when

attackers using different transmis- sion power

levels. The performance of localizing adversaries

achieves similar results as those under normal

conditions, thereby, providing strong evidence of

the effectiveness of our approach in detecting

wireless spoofing attacks, deter- mining the number

of attackers and localizing adversaries.

7. REFERENCES

[1] J. Bellardo and S. Savage, “802.11 Denial-

of-Servic Attacks: Real Vulnerabilities and

Practical Solutions,” Proc. USENIX Security

Symp., pp. 15-28, 2003.

[2] F. Ferreri, M. Bernaschi, and L.

Valcamonici, “Access Points Vulnerabilities

to Dos Attacks in 802.11 Networks,Proc. IEEE

Wireless Comm. and Networking Conf., 2004.

[3] D. Faria and D. Cheriton, “Detecting

Identity- Based Attacks in Wireless Networks

Using Signalprints,” Proc. ACM Workshop

Wireless Security (WiSe), Sept. 2006

[4] Q. Li and W. Trappe, “Relationship-

Based Detection of Spoofing- Related

Anomalous Traffic in Ad Hoc Networks,” Proc.

Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad

Hoc Comm. and Networks

(SECON), 2006.

[5] B. Wu, J. Wu, E. Fernandez, and S.

Magliveras, “Secure and Efficient Key

Management in Mobile Ad Hoc Networks,”

Proc. IEEE Int’l Parallel and Distributed Processing

Symp. (IPDPS), 2005.

[6] A. Wool, “Lightweight Key Management

for IEEE 802.11 Wireless Lans With Key

Refresh and Host Revocation,” ACM/Springer

Wireless Networks, vol. 11, no. 6, pp. 677-686,

2005.

[7] Y. Sheng, K. Tan, G. Chen, D. Kotz,

and A. Campbell, “Detecting 802.11 MAC

Layer Spoofing Using Received Signal

Strength,” Proc. IEEE INFOCOM, Apr. 2008.

[8] J. Yang, Y. Chen, and W. Trappe,

“Detecting Spoofing Attacks in Mobile Wireless

Environments,” Proc. Ann. IEEE Comm. Soc. Conf.

Sensor, Mesh and Ad Hoc Comm. and Networks

[9] Y. Chen, W. Trappe, and R.P. Martin,

“Detecting and Localizing Wireless Spoofing

Attacks,” Proc. Ann. IEEE Comm. Soc. Conf.

Sensor, Mesh and Ad Hoc Comm. and Networks

(SECON), May 2007.

[10] M. Bohge and W. Trappe, “An

Authentication Framework for Hierarchical Ad

Hoc Sensor Networks,” Proc. ACM Workshop

Wireless Security (WiSe), pp. 79-87, 2003.

[11] L. Xiao, L.J. Greenstein, N.B.

Mandayam, and W. Trappe, “Fingerprints in

the Ether: Using the Physical Layer for

Wireless Authentication,” Proc. IEEE Int’l Conf.

Comm. (ICC), pp. 4646-4651, June 2007.

[12] V. Brik, S. Banerjee, M. Gruteser, and S.

Oh, “Wireless Device Identification with

Radiometric Signatures,” Proc. 14th ACM Int’l

Conf. Mobile Computing and Networking, pp. 116-

127, 2008.

[13] F. Guo and T. Chiueh, “Sequence Number-

Based MAC Address Spoof Detection,” Proc.

Page 19: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 364

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

Eighth Int’l Conf. Recent Advances in Intrusion

Detection, pp. 309-329, 2006.

[14] L. Sang and A. Arora, “Spatial Signatures for

Lightweight Security in Wireless Sensor

Networks,” Proc. IEEE INFOCOM, pp. 2137-

2145,2008.

[15] P. Bahl and V.N. Padmanabhan, “RADAR:

An in-Building RF- Based User Location

and Tracking System,”

[16] E. Elnahrawy, X. Li, and R.P. Martin, “The

Limits of Localization Using Signal Strength: A

Comparative Study,”

[17] Y. Chen, J. Francisco, W. Trappe, and

R.P. Martin, “A Practical Approach to

Landmark Deployment for Indoor

Localization,”Proc. IEEE Int’l Conf. Sensor

and Ad Hoc Comm. and Networks (SECON),

Sept. 2006.

[18] J. Yang and Y. Chen, “A Theoretical

Analysis of Wireless Localization Using RF-

Based Fingerprint Matching,” Proc. Fourth Int’l

Workshop System Management Techniques,

Processes, and Services (SMTPS), Apr. 2008.

[19] P. Enge and P. Misra, Global Positioning

System: Signals, Measure- ments and Performance.

Ganga-Jamuna Press, 2001.

[20] Z. Yang, E. Ekici, and D. Xuan, “A

Localization-Based Anti-Sensor Network

System,” Proc. IEEE INFOCOM, pp. 2396-2400,

2007. [21] T. He, C. Huang, B. Blum, J.A.

Stankovic, and T. Abdelzaher,“Range-Free

Localization Schemes in Large Scale Sensor

Net-works,” Proc. MobiCom ’03, 2003.

[22] Y. Chen, W. Trappe, and R. Martin, “Attack

Detection in Wireless Localization,” Proc. IEEE

INFOCOM, Apr. 2007.

[23] A. Goldsmith, Wireless Communications:

Principles and Practice. Cambridge Univ. Press,

2005.

[24] T. Sarkar, Z. Ji, K. Kim, A. Medouri, and

M. Salazar-Palma, “A Survey of Various

Propagation Models for Mobile Communica-

tion,” IEEE Antennas and Propagation Magazine,

vol. 45, no. 3, pp. 51-82, June 2003.

[25] M. Abramowitz and I.A. Stegun,

Handbook of Mathematical Functions with

Formulas, Graphs, and Mathematical Tables. Courier

Dover, 1965.

[26] L. Kaufman and P.J. Rousseeuw, Finding

Groups in Data: An Introduction to Cluster

Analysis. Wiley Series in Probability and

Statistics, 1990.

[27] G. Zhou, T. He, S. Krishnamurthy, and J.A.

Stankovic, “Model and Solutions for Radio

Irregularity in Wireless Sensor Net- works,”

ACM Trans. Sensor Networks, vol. 2, pp. 221-262,

2006. [28] Y. Chen, K. Kleisouris, X. Li, W.

Trappe, and R.P. Martin, “The Robustness of

Localization Algorithms to Signal Strength

Attacks: A Comparative Study,” Proc. Int’l Conf.

Distributed Computing in Sensor Systems

(DCOSS), pp. 546-563, June 2006.

[29] C. van Rijsbergen, Information Retrieval,

second ed. Butterworths, 1979.

[30] T. Fawcett, “An Introduction to ROC

Analysis,” Pattern Recogni- tion Letters, vol. 27,

pp. 861-874, 2006.

[31] P. Rousseeuw, “Silhouettes: A Graphical

Page 20: IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346 …igmpublication.org/ijmeit issue/v2-i6/10 ijmeit.pdfDetection and Localization of Multiple Spoofing Attackers in Wireless Networks

S.P.Deshpande, Krishna Hukkeri et al IJMEIT

Volume 2 Issue 6 June 2014 Page 365

IJMEIT// Vol. 2 Issue 6 //June 2014 //Page No: 346-365//e-ISSN-2348-196x

: 2348-196x

[2014]

Aid to the Interpretation and Validation of

Cluster Analysis,” J. Computational and Applied

Math., vol. 20, no. 1, pp. 53-65, Nov. 1987.

[32] K. Wang, “Estimating the Number of

Clusters via System Evolution for Cluster

Analysis of Gene Expression Data,”

Technical Report NO. 2007-258, Computer

Science Dept., Xidian Univ., P.R. China, 2007.

ACKNOWLEDGMENT

The preferred spelling of the word

“acknowledgment” in America is without an “e”

after the “g”. Avoid the stilted expression, “One of

us (R. B. G.) thanks . . .” Instead, try

“R. B. G. thanks”. Put applicable sponsor

acknowledgments here; DO NOT place them on the

first page of your paper or as a footnote.

REFERENCES

List and number all bibliographical references in 9-

point Times, single-spaced, at the end of your paper.

When referenced in the text, enclose the citation

number in square brackets, for example: [1]. Where

appropriate, include the name(s) of editors of

referenced books. The template will number

citations consecutively within brackets [1]. The

sentence punctuation follows the bracket [2]. Refer

simply to the reference number, as in “[3]”—do not

use “Ref. [3]” or “reference [3]”. Do not use

reference citations as nouns of a sentence (e.g., not:

“as the writer explains in [1]”).

Unless there are six authors or more give all

authors’ names and do not use “et al.”. Papers that

have not been published, even if they have been

submitted for publication, should be cited as

“unpublished” [4]. Papers that have been accepted

for publication should be cited as “in press” [5].

Capitalize only the first word in a paper title, except

for proper nouns and element symbols.

For papers published in translation journals, please

give the English citation first, followed by the

original foreign-language citation [6].

G. Eason, B. Noble, and I. N. Sneddon, “On certain

integrals of Lipschitz-Hankel type involving

products of Bessel functions,” Phil. Trans. Roy.

Soc. London, vol. A247, pp. 529–551, April

1955. (references)

J. Clerk Maxwell, A Treatise on Electricity and

Magnetism, 3rd ed., vol. 2. Oxford: Clarendon,

1892, pp.68–73.

I. S. Jacobs and C. P. Bean, “Fine particles, thin

films and exchange anisotropy,” in Magnetism,

vol. III, G. T. Rado and H. Suhl, Eds. New

York: Academic, 1963, pp. 271–350.

K. Elissa, “Title of paper if known,” unpublished.

R. Nicole, “Title of paper with only first word

capitalized,” J. Name Stand. Abbrev., in press.

Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa,

“Electron spectroscopy studies on magneto-

optical media and plastic substrate interface,”

IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–

741, August 1987 [Digests 9th Annual Conf.

Magnetics Japan, p. 301, 1982].

M. Young, The Technical Writer's Handbook. Mill

Valley, CA: University Science, 1989.