Detecting and Localizing Wireless Spoofing Attacks
Source: Rutgers University
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead. In this paper the authors propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. They first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, they describe how they integrated the attack detector into a real-time indoor localization system, which is also capable of localizing the positions of the attackers.