Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks

Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil attacks, which allows for many other forms of attacks on the networks. Although, the identity of a node can be verified through cryptographic authentication, authentication is not always possible, because it requires key management and additional infrastructural overhead. In this paper, the authors propose a method for detecting both spoofing and Sybil attacks by using the same set of techniques. They first propose a generalized attack-detection model that utilizes the spatial correlation of Received Signal Strength (RSS) inherited from wireless nodes. They further provide a theoretical analysis of their approach.

Provided by: Institute of Electrical & Electronic Engineers Topic: Mobility Date Added: Jun 2010 Format: PDF

Download Now

Find By Topic