SlideShare une entreprise Scribd logo
1  sur  12
 REAL TIME PROJECTS 
 IEEE BASED PROJECTS 
 EMBEDDED SYSTEMS 
 PAPER PUBLICATIONS 
 MATLAB PROJECTS 
 targetjsolutions@gmail.com 
 (0)9611582234, (0)9945657526 
Targetj Solutions - 9611582234
Targetj Solutions - 9611582234
 Wireless spoofing attacks are easy to launch and can 
significantly impact the performance of networks. Although 
the identity of a node can be verified through cryptographic 
authentication, conventional security approaches are not 
always desirable because of their overhead requirements. In 
this paper, we propose to use spatial information, a physical 
property associated with each node, hard to falsify, and not 
reliant on cryptography, as the basis for 1) detecting spoofing 
attacks; 2) determining the number of attackers when multiple 
adversaries masquerading as the same node identity; and 3) 
localizing multiple adversaries. We propose to use the spatial 
correlation of received signal strength (RSS) inherited from 
wireless nodes to detect the spoofing attacks. We then 
formulate the problem of determining the number of attackers 
as a multiclass detection problem. 
Targetj Solutions - 9611582234
CONTINUE…. 
Cluster-based mechanisms are developed to determine the 
number of attackers. When the training data are available, we 
explore using the Support Vector Machines (SVM) method to 
further improve the accuracy of determining the number of 
attackers. In addition, we developed an integrated detection 
and localization system that can localize the positions of 
multiple attackers. We evaluated our techniques through two 
testbeds using both an 802.11 (WiFi) network and an 
802.15.4 (ZigBee) network in two real office buildings. Our 
experimental results show that our proposed methods can 
achieve over 90 percent Hit Rate and Precision when 
determining the number of attackers. Our localization results 
using a representative set of algorithms provide strong 
evidence of high accuracy of localizing multiple adversaries. 
Targetj Solutions - 9611582234
 In the EXISTING SYSTEM, due to the open 
medium in Wireless Sensor Networks, spoofing attacks 
are easy to launch and can significantly impact the 
performance of networks. So that the nodes can be easily 
compromised and perform malicious activities. Although 
the identity of a node can be verified through 
cryptographic authentication, conventional security 
approaches are not always desirable because of their 
overhead requirements. 
DISADVANTGES: 
 Spoofing Attacks can be easily launched. 
 Nodes can be easily compromised and perform malicious 
activities. 
Targetj Solutions - 9611582234
 In the PROPOSED SYSTEM, we are 
implementing three steps 1. Detection of Spoofing 
attacks based on Received Signal Strength. 2. 
Determining the number of attackers when multiple 
adversaries masquerading the same node identity. So 
that we can identify the attackers who are all 
performing the spoofing attacks. 3. Localizing the 
multiple adversaries and eliminate them from the 
network if necessary. So that the other nodes may 
know about the attacker nodes in the Wireless Sensor 
Networks. 
Targetj Solutions - 9611582234
ADVANTAGES: 
 Easy to detect the spoofing attacks. 
 Eliminating the attacker node will provide more 
security to the network. 
 Encrypting the data packets restrict the intermediate 
nodes from viewing the original data. 
Targetj Solutions - 9611582234
SOFTWARE REQUIREMENTS: 
 Platform : Windows XP 
 Front End : Java JDK1.5. 
 Back End : MYSQL 
HARDWARE REQUIREMENTS: 
 Processor : Pentium IV 
 RAM : 512 MB 
 HDD : 80 GB 
Targetj Solutions - 9611582234
 In this work, we proposed to use received signal 
strength based spatial correlation, a physical property 
associated with each wireless device that is hard to falsify 
and not reliant on cryptography as the basis for detecting 
spoofing attacks in wireless networks. We provided 
theoretical analysis of using the spatial correlation of RSS 
inherited from wireless nodes for attack detection. We 
derived the test statistic based on the cluster analysis of 
RSS readings. Our approach can detect the presence of 
attacks as well as determine the number of adversaries, 
spoofing the same node identity, so that we can localize 
any number of attackers and eliminate them. Determining 
the number of adversaries is a particularly challenging 
problem. 
Targetj Solutions - 9611582234
 We developed SILENCE, a mechanism that employs 
the minimum distance testing in addition to cluster 
analysis to achieve better accuracy of determining the 
number of attackers than other methods under study, 
such as Silhouette Plot and System Evolution that use 
cluster analysis alone. Additionally, when the training 
data are available, we explored using Support Vector 
Machines-based mechanism to further improve the 
accuracy of determining the number of attackers 
present in the system. 
Targetj Solutions - 9611582234
 [1] J. Bellardo and S. Savage, “802.11 Denial-of-Service 
Attacks: Real Vulnerabilities and Practical Solutions,” 
Proc. USENIX Security Symp., pp. 15-28, 2003. 
 [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access 
Points Vulnerabilities to Dos Attacks in 802.11 Networks,” 
Proc. IEEE Wireless Comm. and Networking Conf., 2004. 
 [3] D. Faria and D. Cheriton, “Detecting Identity-Based 
Attacks in Wireless Networks Using Signalprints,” Proc. 
ACM Workshop Wireless Security (WiSe), Sept. 2006. 
 [4] Q. Li and W. Trappe, “Relationship-Based Detection of 
Spoofing- Related Anomalous Traffic in Ad Hoc 
Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and 
Sensor and Ad Hoc Comm. and Networks (SECON), 2006. 
Targetj Solutions - 9611582234
 [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, 
“Secure and Efficient Key Management in Mobile Ad 
Hoc Networks,” Proc. IEEE Int’l Parallel and 
Distributed Processing Symp. (IPDPS), 2005. 
 [6] A. Wool, “Lightweight Key Management for 
IEEE 802.11 Wireless Lans With Key Refresh and 
Host Revocation,” ACM/Springer Wireless Networks, 
vol. 11, no. 6, pp. 677-686, 2005. 
 [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. 
Campbell, “Detecting 802.11 MAC Layer Spoofing 
Using Received Signal Strength,” Proc. IEEE 
INFOCOM, Apr. 2008. 
Targetj Solutions - 9611582234

Contenu connexe

Tendances

Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecway Technologies
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
A Survey on Cloud-Based IP Trace Back Framework
A Survey on Cloud-Based IP Trace Back FrameworkA Survey on Cloud-Based IP Trace Back Framework
A Survey on Cloud-Based IP Trace Back FrameworkIRJET Journal
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
 

Tendances (17)

Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
N0704075079
N0704075079N0704075079
N0704075079
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
 
Kracking WPA2
Kracking WPA2Kracking WPA2
Kracking WPA2
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
A Survey on Cloud-Based IP Trace Back Framework
A Survey on Cloud-Based IP Trace Back FrameworkA Survey on Cloud-Based IP Trace Back Framework
A Survey on Cloud-Based IP Trace Back Framework
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
36
3636
36
 
52
5252
52
 

Similaire à Detection and localization of multiple spoofing attacks in

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...SBGC
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecuritySBGC
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET Journal
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksEcwayt
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksEcwayt
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecwaytech
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksecwayprojects
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecwayt
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...ecwayerode
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...Ecway Technologies
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksecway
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 

Similaire à Detection and localization of multiple spoofing attacks in (20)

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 

Plus de Finalyear Projects

Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicFinalyear Projects
 
Energy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networksEnergy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networksFinalyear Projects
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokersFinalyear Projects
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...Finalyear Projects
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesFinalyear Projects
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyFinalyear Projects
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyFinalyear Projects
 
Fpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplicationFpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplicationFinalyear Projects
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gatheringFinalyear Projects
 
Java ieee projects titles 2014 2015
Java ieee projects  titles 2014 2015Java ieee projects  titles 2014 2015
Java ieee projects titles 2014 2015Finalyear Projects
 
System proposal and crs model design applying
System proposal and crs model design applyingSystem proposal and crs model design applying
System proposal and crs model design applyingFinalyear Projects
 
Discovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionDiscovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionFinalyear Projects
 
Navigation by the soles of your feet
Navigation by the soles of your feetNavigation by the soles of your feet
Navigation by the soles of your feetFinalyear Projects
 
Android Mobile - Home Automation
Android Mobile - Home Automation Android Mobile - Home Automation
Android Mobile - Home Automation Finalyear Projects
 

Plus de Finalyear Projects (17)

Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logic
 
Energy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networksEnergy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networks
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
 
IEEE Projects 2014-2015
IEEE Projects 2014-2015IEEE Projects 2014-2015
IEEE Projects 2014-2015
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highly
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highly
 
Fpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplicationFpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplication
 
Keyword query routing
Keyword query routingKeyword query routing
Keyword query routing
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
 
Java ieee projects titles 2014 2015
Java ieee projects  titles 2014 2015Java ieee projects  titles 2014 2015
Java ieee projects titles 2014 2015
 
System proposal and crs model design applying
System proposal and crs model design applyingSystem proposal and crs model design applying
System proposal and crs model design applying
 
Discovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionDiscovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detection
 
Navigation by the soles of your feet
Navigation by the soles of your feetNavigation by the soles of your feet
Navigation by the soles of your feet
 
Android Mobile - Home Automation
Android Mobile - Home Automation Android Mobile - Home Automation
Android Mobile - Home Automation
 
Home automation
Home automationHome automation
Home automation
 

Dernier

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 

Dernier (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

Detection and localization of multiple spoofing attacks in

  • 1.  REAL TIME PROJECTS  IEEE BASED PROJECTS  EMBEDDED SYSTEMS  PAPER PUBLICATIONS  MATLAB PROJECTS  targetjsolutions@gmail.com  (0)9611582234, (0)9945657526 Targetj Solutions - 9611582234
  • 2. Targetj Solutions - 9611582234
  • 3.  Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Targetj Solutions - 9611582234
  • 4. CONTINUE…. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, we explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries. Targetj Solutions - 9611582234
  • 5.  In the EXISTING SYSTEM, due to the open medium in Wireless Sensor Networks, spoofing attacks are easy to launch and can significantly impact the performance of networks. So that the nodes can be easily compromised and perform malicious activities. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. DISADVANTGES:  Spoofing Attacks can be easily launched.  Nodes can be easily compromised and perform malicious activities. Targetj Solutions - 9611582234
  • 6.  In the PROPOSED SYSTEM, we are implementing three steps 1. Detection of Spoofing attacks based on Received Signal Strength. 2. Determining the number of attackers when multiple adversaries masquerading the same node identity. So that we can identify the attackers who are all performing the spoofing attacks. 3. Localizing the multiple adversaries and eliminate them from the network if necessary. So that the other nodes may know about the attacker nodes in the Wireless Sensor Networks. Targetj Solutions - 9611582234
  • 7. ADVANTAGES:  Easy to detect the spoofing attacks.  Eliminating the attacker node will provide more security to the network.  Encrypting the data packets restrict the intermediate nodes from viewing the original data. Targetj Solutions - 9611582234
  • 8. SOFTWARE REQUIREMENTS:  Platform : Windows XP  Front End : Java JDK1.5.  Back End : MYSQL HARDWARE REQUIREMENTS:  Processor : Pentium IV  RAM : 512 MB  HDD : 80 GB Targetj Solutions - 9611582234
  • 9.  In this work, we proposed to use received signal strength based spatial correlation, a physical property associated with each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in wireless networks. We provided theoretical analysis of using the spatial correlation of RSS inherited from wireless nodes for attack detection. We derived the test statistic based on the cluster analysis of RSS readings. Our approach can detect the presence of attacks as well as determine the number of adversaries, spoofing the same node identity, so that we can localize any number of attackers and eliminate them. Determining the number of adversaries is a particularly challenging problem. Targetj Solutions - 9611582234
  • 10.  We developed SILENCE, a mechanism that employs the minimum distance testing in addition to cluster analysis to achieve better accuracy of determining the number of attackers than other methods under study, such as Silhouette Plot and System Evolution that use cluster analysis alone. Additionally, when the training data are available, we explored using Support Vector Machines-based mechanism to further improve the accuracy of determining the number of attackers present in the system. Targetj Solutions - 9611582234
  • 11.  [1] J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. USENIX Security Symp., pp. 15-28, 2003.  [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004.  [3] D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006.  [4] Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006. Targetj Solutions - 9611582234
  • 12.  [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks,” Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005.  [6] A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.  [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008. Targetj Solutions - 9611582234