SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3585
DETECTION OF SPOOFING AND JAMMING ATTACKS IN WIRELESS
SMART GRID NETWORKS USING RSS ALGORITHM
K.Suganthi1,K.Sahana2,G.Santhiya3,S.Swathi4.
1 Assistant Professor Dept. Computer of Science and Engineering, Arasu Engineering College, Tamil nadu, India.
2,3,4 Students Dept. of Science and Engineering, Arasu Engineering College, Tamil nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract- Wireless power grid networks consistofnumerous
small home nodes and power production nodes that can
collect, and disseminate information for the processing of
information of power consumption. Several of these
applications involve the communication of sensitive
information that must be protected from unauthorized
parties. Although the wireless network communicationscould
be secured via standard cryptographic methods, the
communication patterns alone leak contextual information,
which refers to event-related parameters that are inferred
without accessing the report contents. Under a global model,
all communications within the wireless networksareassumed
to be intercepted and collectively analyzed. State-of-the-art
countermeasures conceal traffic associated to real events by
injecting dummy packets according to a predefined
distribution. In these methods, real transmissions take place
by substituting scheduled dummy transmissions, which
decorrelates the occurrence of an event from the
eavesdropped traffic patterns. However, concealment of
contextual information comes at the expense of high
communication overhead and increased end-to-end delay for
reporting events. In this section, we propose a general traffic
analysis method using Received Signal Strength for inferring
contextual information from jamming attacks and spoofing
attacks. Our method is meant as a baseline for evaluating the
performance of protection mechanisms with varying
underlying assumptions. Therefore, it relies on minimal
information, namely the packet interception times, jamming
attacks and eavesdroppers’ locations.
Key words: SVM, Spoofing, Jamming, contextual
information, Traffic analysis
1. Introduction
As more wireless and sensor networks are deployed, they
will increasingly become tempting targets for malicious
attacks. Due to the openness of wireless and sensor
networks, they are especially vulnerable to eavesdropping
attacks where an attacker forges its identity to masquerade
as another device, or even creates multiple illegitimate
identities. Eavesdropping attacks are a seriousthreatasthey
represent a form of identity compromise and can facilitate a
variety of traffic injection attacks, such as evil twin access
point attacks. It is thus desirable to detect the presence of
eavesdropping and eliminate them from the network. The
traditional approach to address eavesdropping attacks is to
apply cryptographic authentication. However,
authentication requiresadditional infrastructural overhead
and computational power associated with distributing, and
maintaining cryptographic keys. Due to the limited power
and resources available to the wireless devices and sensor
nodes, it is not always possible to deploy authentication. In
addition, key management often incurs significant human
management costs on the network.In this project, we take a
different approach by using the physical properties
associated with wireless transmissions to detect
eavesdropping. Specifically, we propose a scheme for both
detecting eavesdropping attacks, as well as localizing the
positions of the adversaries performing the attacks. Our
approach utilizes the Received Signal Strength (RSS)
measured across a set of access points to perform
eavesdropping detection and localization. Our scheme does
not add any overhead to the wireless devices and sensor
nodes.Due to the shared nature of the wireless medium,
attackers can gather useful identity information during
passive monitoring and further utilize the identity
information to launch identity-based attacks, in particular,
the two most harmful but easy to launch attacks: 1)
eavesdropping attacks and 2) Sybil attacks.Inidentity-based
eavesdropping attacks, an attacker can forge its identity to
masquerade as another device or even create multiple
illegitimate identities in the networks. For instance, in an
IEEE 802.11 network, it is easy for an attacker to modify its
Media Access Control (MAC) address of network interface
card (NIC) to another device through vendor-supplied NIC
drivers or open-source NIC drivers. In addition, by
masquerading as an authorized wirelessaccesspoint(AP)or
an authorized client, an attacker canlaunchdenial-of-service
(DoS) attacks, bypass access control mechanisms, or falsely
advertise services to wireless clients.Therefore; identity-
based attacks will have a serious impact to the normal
operation of wireless and sensor networks. It is thus
desirable to detect the presence of identity-based attacks
and eliminate them from the network. The traditional
approach to address identity-based attacks is to apply
cryptographic authentication. However, authentication
requires additional infrastructural overhead and
computational power associated with distributing and
maintaining cryptographic keys. Due to the limited power
and resources available to the wireless devices and sensor
nodes, it is not alwayspossible to deploy authentication.Due
to the shared nature of the wireless medium, attackers can
gather useful identity informationduringpassivemonitoring
and utilize the identity information to launch identity based
eavesdropping attacksin wirelessand sensor networks.For
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3586
instance, in an 802.11 network, it is easy for a wireless
device to acquire a valid MAC address and masquerade as
another device. The IEEE 802.11 protocol suite provides
insufficient identity verification during message exchange,
including most control and management frames. Therefore,
the adversary can utilize this weakness and request various
services as if it were another user. Identity-based
eavesdropping attacks are a serious threat in the network,
because they represent a form of identity compromise and
can facilitate a series of traffic injection attacks, including
eavesdropping-based attacks. For instance,anadversarycan
launch a de authentication attack. After a client chooses an
AP for future communication, it must authenticate itself to
the AP before the communication session starts. Both the
client and the AP are allowed to explicitly request for de
authentication to void the existing authentication
relationship with each other. Unfortunately, this de
authentication message is not authenticated. Therefore, an
attacker can spoof this de authentication message, either on
behalf of the client or on behalf of the AP. The adversary can
persistently repeat this attack and completely prevent the
client from transmitting or receiving. Furthermore, an
attacker can utilize identity eavesdropping and launch the
rogue AP attack against the wireless network. In the rogue
AP attack, the adversary first sets up a rogue AP with the
same MAC address and service set identifier as the
legitimate AP but with a stronger signal. When a station
enters the coverage of the rogue AP, the default network
configuration will make the station automatically associate
with the rogue AP, which has a stronger signal. Then, the
adversary can take actions to influence the communication.
For example, it can direct fake traffic to the associated
station or drop the requests made by the station. Aside from
the basic packet-flooding attacks, the adversary can make
use of identity eavesdropping to performmoresophisticated
flooding attacks on APs, such as probe request,
authentication request, and association request flooding
attacks. Received Signal Strength is widely available in
deployed wireless communication networks, and its values
are closely correlated with location in physical space. In
addition, RSS is a common physical property used by a
widely diverse set of localization algorithms. In spite of its
several-meter-level localization accuracy, using RSS is an
attractive approach, because it can reuse the existing
wireless infrastructure, and it is sufficient to meet the
accuracy requirement of most applications. For example,
during health care monitoring, a doctor may only need to
know in which room the tracked patient resides. Although
affected by random noise, environmentalbias,andmultipath
effects, the RSS measured at a set of landmarks (i.e.,
reference points with known locations) is closely related to
the transmitter’s physical location and is governed by the
distance to the landmarks. The RSS readings at different
locations in physical space are distinctive.
During the localization process, the following stepswilltake
place:
1. A Transmitter sends a packet. Some number of
Landmarks observes the packet and records the RSS.
2. Each Landmark forwards the observed RSS from the
transmitter to the Server.
3. The Server collects the complete RSS vector for the
transmitter and sends the information to a Solver
instance for location estimation.
4. The Solver instance performs localization and returns
the coordinates of the transmitter back to the Server.
1.1 literature survey
Muhammad Akhlaq et al [1]RTSP: An Accurate and Energy-
Efficient Protocol for Clock Synchronization in WSNs.
Recursive Time Synchronization Protocol (RTSP) which
accurately synchronizes all the nodes in a network to a
global clock using multi-hop architecture in an energy-
efficient way. RTSP Algorithm Used. Reducingthenumberof
time synchronization requests through the adaptive re-
synchronization interval and aggregationofsynchronization
requests.
Another approach is Muhammad Akhlaq [2] proposed the
study of Statistical Framework for Source Anonymity in
Sensor Networks. It introduces the notion of “interval in
distinguish ability” and provides a quantitative measure to
model anonymity in wireless sensor networks; second, it
maps source anonymity to the statistical problem of binary
hypothesis testing with nuisance parameters. We then
analyze existing solutions for designing anonymous sensor
networks using the proposed model analyze existing
solutions for designing anonymous sensor networks using
the proposed model. Anonymity, hypothesis testing,
nuisance parameters.We transform the problem from
analyzing real-valued sample points to binary codes, which
opens the door for coding theory to be incorporated intothe
study of anonymous sensor networks.
Another approach is Frederik Armknecht and Joao Girao[3]
proposed the study of Privacy at link layer..The widespread
usage of these technologies comes at the price of location
privacy, be it by observing the communication patterns or
the interface identifiers. Although a numberofnetworklevel
solutions have been proposed, describesanovelapproachto
location privacy at the link layer level. Re-synchronization
Mechanism. Used in conjunction with a pseudonym
mechanism to prevent tracking by active communicating
peers, this could be an interesting new direction for our
work. Nevertheless, our approach provides privacy at the
link layer without significantly undermining the
performance of the network.
Another approach is Matthias Fruth [4] proposed the study
of Probabilistic Model Checking of Contention Resolution in
the IEEE 802.15.4 Low-Rate Wireless Personal Area
Network Protocol. Verify correctness properties, compare
different operation modes of the protocol, and analyze
performance and accuracy of different model abstractions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3587
Used IEEE 802.3 for Ethernet and IEEE 802.11 for Wireless
LAN. New scenarios could contain a larger number of
stations and more complex behaviors’ ofthestations,suchas
transmitting more than one message per station and
allowing stations to send and to receive.
Another approach is Xi Luo, Xu Ji [5] proposed the study of
Location Privacy against Traffic AnalysisAttacks inWireless
Sensor Network. Firstly, a random routing scheme (RRS) is
proposed to provide path diversity. Secondly, we combine
RRS with a dummy packet injection scheme (DPIS) to
confuse the adversary by tracing or tracing back the
forwarded packet to reach the receiver or source. Finally,an
anonymous communication scheme (ACS) is proposed to
hide the identities of all nodes that participate in packets
transmission. Random Routing. Through the security
analysis and performance analysis, we can seeourproposed
scheme can effectively prevent the traffic analysis attacks,
and has the less delivery time and energy consumption
compared
Another approach is Ben Greenstein [6] proposed the study
of Improving Wireless Privacy with an Identifier FreeLink
Layer Protocol. Nearly as efficient as existing schemes such
asWPA for discovery, link setup, and datadeliverydespiteits
heightened protections; transmission requires only
symmetric key encryption and reception requires a table
lookup followed by symmetric key decryption. Anonymity.
Showed how a link layer could use two mechanisms, Tryst
and Shroud, to perform this obfuscation while stillachieving
efficient discovery, link establishment, and data transport,
and without sacrificing other crucial link layer functions
such as higher layer name binding
Another approach is Yong Xi [8] proposed the study of
Preserving Source Location Privacy in MonitoringBased
Wireless Sensor Networks. They propose GROW (Greedy
Random Walk), a two-way random walk, i.e., from both
source and sink, to reduce the chance an eavesdropper can
collect the location information. We improve the delivery
rate by using local broadcasting and greedy forwarding.
Privacy protection is verified under a backtracking attack
model. The message delivery time is a little longer than that
of the broadcasting-based approach, but it is still acceptable
if we consider the enhanced privacy preserving capabilityof
this new approach. GROW Algorithm. Can monitorthetraffic
and deduce the approximate locationofmonitoredobjectsin
certain situations.
Another approach is Celal Ozturk [7] proposed the
study of Source Location Privacy in Energy Constrained
Sensor Networks. While developing and evaluating our
privacy-aware routing protocols; we jointly consider issues
of location-privacy as well as the amount of energy
consumed by the sensor network. Motivated by the
observations, we propose a flexible routing strategy, known
as phantom routing, which protects the source’s location.
Source-Location Privacy. Our investigationshaveshownthat
phantom routing is a powerful technique for protecting the
location of the source during sensor transmissions
2. PROPOSED WORK
In this proposed work, we build a efficient traffic
randomization for hiding contextual information in event-
driven WSNs, under a global adversary may study. Ourmain
contributions are summarized as follows: This system
presents a general traffic analysis method for inferring
contextual information that is used as a baseline for
comparing methods with varying assumptions and it can
obtain the Received Signal Strength in receiver end fromthe
signal transmission of the sender. It can calculate the signal
variation to obtain the location of the eavesdropper.
Our method relies on minimal information, namely packet
transmission time and eavesdropping location. This system
proposes traffic normalization methods that hide the event
location, its occurrence time, and the sink location from
global eavesdroppers. Compared to existingapproaches,our
methodsreduce the communication and delay overheadsby
limiting the injected bogus traffic. This is achieved by
constructing minimum connected dominating sets (MCDSs)
and MCDSs with shortest paths to the sink (SSMCDSs). Here
a loose transmission coordination scheme that reduces the
end to end delay for the reporting events. The schemes in
LTC cannot be combined with each other these techniques
send the optimal packets appropriate times or through
appropriate paths.
Advantages:
 Overcome the drawback of eavesdropper’s
localization.
 The proposed system reduces the communication
and delay overheads by limiting the injected bogus
traffic.
 The proposed system reducesthe forwardingdelay
Fig. 1 System Architecture
Fig. 1 shows the architecture of our model.users send the
message to the other user using WPGN(wireless power grid
network).At the same time eavesdropper view the message
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3588
from WPGN. So that hacker can easily gather the
information. Attacker can be detected based on the traffic
analysis using RSS algorithm(received signal strength)
sometimes referred as RSSI (Received signal strength
indicator) is a measurement of the power present in a
received radio signal. The nodes used by the Accurate WiFi
Location Monitor and Bluetooth Beacon Tracker arecapable
of measuring the RSS of nearby Wi-Fi and BLE devices.The
RSS values are measured in dBm and have typical negative
values ranging between 0 dBm (excellent signal) and -110
dBm (extremely poor signal). By using RSS we can analysis
both active and passive attack .finally the location of the
hacker can be analysed and mitigation them.
2.1 PROBLEM FORMULATION
To formulate our problem, Moreover, our attack strategy,
RSS, is designed on the basis of the features of jamming and
spoofing attacks. The attack effects can be counted in either
probability or return values the operating principles of
jamming and spoofing attacks in SVM. This shows the
characteristicsof SVM the variouspower levelsarerequired
for classify the attack strategy. The threshold value can
determine the location of attacker. The height of each cube
illustrates the power level required by adversaries. The
distinctness of the heights shows the variety of demanded
powers. The adversarial positions are marked in the figure.
In addition, represents a SVM frame structure that consists
of a sensing and a transmission message. In SVM, the
vulnerabilities often address.
The periodic sensing stage in which the secondary usersare
searching available location.
Max [V wtotal; Prtotal] = Max [Xs (i) V w (i);Y s(i) Pr(i)] (1)
Where
Xs (i)V w (i) =Xs(i)=0V w(i) +Xs(i)=1V w(i) (2)
and Ys(i)Pr(i) =Ys(i)=0Pr(i) -Ys(i)=1Pr(i) (3)
Under a power constraint (Pw).Furthermore, our approach
aims to find out an optimal adversarial plan when the level
of available power Pw is fixed.To consider the total return
value, we give the objective function
Of the problem in Eq. (1), which shows that the goal is to
maximize the pair (V wtotal, Prtotal) under the given power
constraint Pw. Given a binary function s(i), s(i) = 1 when J
attack is applied and s(i) = 0 when S attack is applied.The
total attack return value V wtotal is a sum of all return
values from all frequency spectrums, expressed in Eq.
(2).Additionally, the adversarial strategy will depend onthe
attack success probabilities. The method of calculating total
Prtotal is shown in Eq. (3) that is a production of all
probabilities.Using our proposed approach can dynamically
switch attack methods between jamming and spoofing in
order to reach the Optimum attack performance and
mitigate them.
Generate Algorithm:
Notations used in algorithms are given as follows: Pk
I;j denotes
The probability of ith frequency spectrum with the power
value j. k is the index number. V ki;j denotesthe valueweight
of ith frequency spectrum with the power value j.
Additionally, we define an operator “_” for calculating
probabilities and value weights, which is used for the
purpose of pair alternatives. The_ definition is given in 9
two pairs (Pi, Vi) and (Pj , Vj ). then (Pi, Vi)_ (Pj , Vj ) = (Pi _ Pj
, Vi + Vj ) 9 two pair lists Li, Lj , then Li _ Lj will _ all random
pairs from Li and Lj . RSS, is designed to generate a D-Table.
Input of this algorithm is a Basic Table (B-Table) that maps
all the values of Pr and Vw for each spectrum within all
power constraints. In the D-Table, all optimal solutionswith
Parameters Pr and Vw are provided, which represents an
attack Strategy plan. An efficient attack strategy to WSGN
can be obtained by selecting one solution matching the
attack preferences. The attack plan generated from MAS
algorithm is an optimal solution, which relies on Theorem
5.1. The proof of generation of the RSS algorithm
Theorem 5.1 is also given below.
Algorithm 5.1 RECEIVED SIGNAL STRENGTH (RSS)
Algorithm
Require: Attacker location
Ensure: Mitigation of attack
1: A1;j M1;j
2: for 8 Fi, i>1 do
3: for 8 Power j do
4: for 8 Power k in Mi;k do
5: if Ai�1;j�k != null then
6: Ai;j = Ai�1;j�k _ M i;k
7: end if
8: end for
9: Mitigation of the attacker applying Algorithm 5.2
10: end for
11: end for
12: Return Location of the attacker (contains the attack
strategy plan)
2.2 METHODOLOGY
1. Wireless Network Formation:
Two Bluetooth devices are considered with the code
application come into each other communication range, in
order to set up a communication link.This simple“single-
hop” network is called a piconet. Bluetooth technology is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3589
used for both neighbor discoveryanddatacommunicationin
the created piconets
2. Data collection: Detection ofEavesdroppingAttacks:
Using received signal strength (RSS)-based spatial
correlation, utilizing spatial information to addressspoofing
attack.unique power to not only identify the presence of
these attacks but also localize adversaries.An added
advantage of employing spatial correlation will not require
any additional cost or modification to the wireless devices
themselves. The above analysis provides the theoretical
support of using the RSS-based spatial correlation inherited
from wireless nodes to perform spoofing attack detection.
3. DETERMINATION OF NUMBER OF ATTACKERS:
To determining the number of attackers becomes a
multiclass detection problem and is similar to determining
how many clusters exist in the RSS readings.A Silhouette
Plot is a graphical representation of a cluster that used to
determine the number of attackers. The System Evolution
method performs well under difficult cases, such as System
Evolution and SILENCE. Support Vector Machinesto classify
the number of the spoofing attackers. it can combine the
intermediate results.
4. MITIGATION OF SPOOFING ATTACKS:
In this module, using traffic correlation analysis, the
spoofing attackers should be monitored and mitigated from
the wireless networks .It does not affect the wireless
network legitimate mobile nodes by means of proposed
novel approach for mitigating the multiple spoofing attacks.
3. EXPERIMENTAL RESELT
A set of experiments carried out on spoofing and jamming
attack .The performance evaluation of the system is
performing using this dataset. The screenshots of various
phases of Detection of spoofing and jamming attack are as
follows:
FIG.2 REPRESENT THE NETWORK FORMATION AND THE
EXCUTION SERVICE
FIG-3 REPRESENT THE MOBILE NODE FORMATION
FIG-4 REPRESENT THE MESSAGE PASSING THROW ONE
NODE TO ANOTHER NODE
FIG-5 REPRESENT THE DETECTION OF ATTACKS
FIG-6 REPRESENT THE MESSAGE CAN RECEIVED BY
THE ATTACKER
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3590
FIG-7 REPRESENT LOCATION OF THE ATTACKER
(LOCALIZATION)
FIG-8 REPRESENT THE MITIGATION OF ATTACKS
4. CONCLUSION
In this work, here the system proposed to use received
signal strength based spatial correlation,aphysicalproperty
associated with each wireless device that is hard to falsify
and not reliant on cryptography as the basis for detecting
spoofing attacks in wireless networks. It provided
theoretical analysis of using the spatial correlation of RSS
inherited from wirelessnodesfor attackdetection.Itderived
the test statistic based on the cluster analysis of RSS
readings. Our approach can detect the presence of attacksas
well as determine the number of adversaries, spoofing the
same node identity, so that we can localize any number of
attackers and eliminate them.
5. FUTURE ENHANCEMENT
In addition to the spoofing attacks, the insider attackswillbe
considered in future to mitigate and identify the legitimate
user resemblance. The cryptographic techniques should be
used in future if the eavesdropper obtained the data
REFERENCES:
[1] J. Muhammad Akhlaq.”IEEE Std. 1588-2008", IEEE
Standard for a Precision Clock Synchronization Protocol for
Networked Measurement and Control Systems, 2008.
[2] J. Muhammad Akhlaq “Statistical Framework for Source
Anonymity in Sensor Networks", Proc. IEEE Globe Com,
2013.
[3] Frederik Armknecht and Joao Girao, IEEE Standard
802.11. IEEE standard for information technology -
telecommunications and information exchange between
systems -local and metropolitan area networks - specific
requirements, part 11: WirelessLAN medium accesscontrol
(MAC) and physical layer (PHY) specifications, 2007.
[4]MatthiasFruth, "IEEE Standard802.15.4–2003: Wireless
Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for Low-Rate Wireless Personal Area
Networks (LR-WPANs)", IEEE Computer Society, 2007
[5] Xi Luo, Xu Ji,"A Novel Scheme for Protecting Receiver's
Location Privacy in Wireless SensorNetworks", Proc.ofIEEE
Teansactions on Wireless Communications, vol. 7, no. 10,
October 2010
[6] Ben Greenstein, “Improving Wireless Privacy with an
Identifier-Free Link Layer Protocol, 2008
[7] C. Ozturk, Y. Zhang, and W. Trappe, "Source-location
privacy in energy constrained sensor network routing," in
SASN '04: Proceedingsof the 2nd ACMworkshoponSecurity
of ad hoc and sensor networks, (New York, NY, USA), pp. 88-
93, ACM, 2004
[8]Yong Xi, "Preserving source location privacy in
monitoring-based wireless sensornetworks."inIPDPS,IEEE,
2006.
BIOGRAPHIES:
Suganthi.K recehived B.TECH Degree in
Information Technology from Anna
University affiliated college in 2005and
M.Tech Degree from Prist Universityin2014.
She is currently working as Assistant
Professor in the Dept. of Computer Science
and Engineering, Arasu Engineering College, Kumbakonam.
Sahana.K pursuing B.E Degree in the stream
of computer science and engineering at
Arasu engineering college kumbakonam
Santhiya.G pursuing B.E Degreeinthestream
of computer science and engineering at
Arasu engineering college kumbakonam
Swathi.S pursuing B.E Degree in the
stream of computer science and engineering
at Arasu engineering college kumbakonam

More Related Content

What's hot (18)

PDF
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
IRJET Journal
 
PDF
Cit877[1]
poonamjindal6
 
PDF
Trusted Routing Path Selection in WSNs through TARF
Editor IJMTER
 
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
PDF
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
IJSRD
 
PDF
A030101001006
theijes
 
PDF
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
IJCNCJournal
 
PDF
Ijcet 06 07_001
IAEME Publication
 
PDF
Public key based approach to mitigate wormhole attack repaired
prjpublications
 
PDF
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
 
PDF
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
IAEME Publication
 
PDF
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Gokul Alex
 
PDF
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
IOSR Journals
 
PDF
De-Authentication attack on wireless network 802.11i using Kali Linux
IRJET Journal
 
PPT
L2 Intrusion Detection System (IDS)
Rushdi Shams
 
DOC
Detection of application layer ddos attack using hidden semi markov model (20...
Mumbai Academisc
 
PDF
Behavioral Malware Detection in Dtn Using Intrusion Detection System
theijes
 
PDF
Wireless Deauth and Disassociation Attacks explained
David Sweigert
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
IRJET Journal
 
Cit877[1]
poonamjindal6
 
Trusted Routing Path Selection in WSNs through TARF
Editor IJMTER
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
IJSRD
 
A030101001006
theijes
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
IJCNCJournal
 
Ijcet 06 07_001
IAEME Publication
 
Public key based approach to mitigate wormhole attack repaired
prjpublications
 
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS DETECTION MECHANISM
ijcseit
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
IAEME Publication
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Gokul Alex
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
IOSR Journals
 
De-Authentication attack on wireless network 802.11i using Kali Linux
IRJET Journal
 
L2 Intrusion Detection System (IDS)
Rushdi Shams
 
Detection of application layer ddos attack using hidden semi markov model (20...
Mumbai Academisc
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
theijes
 
Wireless Deauth and Disassociation Attacks explained
David Sweigert
 

Similar to IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Networks using RSS Algorithm (20)

PDF
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Kumar Goud
 
PDF
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
IOSR Journals
 
PDF
Security in Wireless Sensor Networks Using Broadcasting
IJMER
 
PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
I1802046780
IOSR Journals
 
PDF
Revisiting the experiment on detecting of replay and message modification
iaemedu
 
PDF
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
PDF
Hg3312711275
IJERA Editor
 
DOC
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 
PDF
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
CSCJournals
 
PDF
A Security Overview of Wireless Sensor Network
IJCSIS Research Publications
 
PDF
Ar34261268
IJERA Editor
 
PDF
Efficient ddos attacks security scheme using asvs
eSAT Journals
 
PDF
Efficient ddos attacks security scheme using asvs
eSAT Publishing House
 
PPT
Detection and localization of multiple spoofing attacks in
Finalyear Projects
 
PDF
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
PPTX
aGHLecture2_2017.pptx
RituParna42
 
PDF
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
PDF
A Review on Wireless Network Security.pdf
Rhonda Cetnar
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Kumar Goud
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
IOSR Journals
 
Security in Wireless Sensor Networks Using Broadcasting
IJMER
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
I1802046780
IOSR Journals
 
Revisiting the experiment on detecting of replay and message modification
iaemedu
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
Hg3312711275
IJERA Editor
 
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
CSCJournals
 
A Security Overview of Wireless Sensor Network
IJCSIS Research Publications
 
Ar34261268
IJERA Editor
 
Efficient ddos attacks security scheme using asvs
eSAT Journals
 
Efficient ddos attacks security scheme using asvs
eSAT Publishing House
 
Detection and localization of multiple spoofing attacks in
Finalyear Projects
 
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
aGHLecture2_2017.pptx
RituParna42
 
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
A Review on Wireless Network Security.pdf
Rhonda Cetnar
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PPTX
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
PDF
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
PPTX
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
PPT
New_school_Engineering_presentation_011707.ppt
VinayKumar304579
 
PPTX
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
PDF
Data structures notes for unit 2 in computer science.pdf
sshubhamsingh265
 
PPTX
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
PDF
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PDF
Digital water marking system project report
Kamal Acharya
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PDF
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PDF
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
PDF
Electrical Machines and Their Protection.pdf
Nabajyoti Banik
 
PDF
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
PPTX
Numerical-Solutions-of-Ordinary-Differential-Equations.pptx
SAMUKTHAARM
 
PDF
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
PPTX
Knowledge Representation : Semantic Networks
Amity University, Patna
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
New_school_Engineering_presentation_011707.ppt
VinayKumar304579
 
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
Data structures notes for unit 2 in computer science.pdf
sshubhamsingh265
 
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
Digital water marking system project report
Kamal Acharya
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
Submit Your Papers-International Journal on Cybernetics & Informatics ( IJCI)
IJCI JOURNAL
 
Electrical Machines and Their Protection.pdf
Nabajyoti Banik
 
MODULE-5 notes [BCG402-CG&V] PART-B.pdf
Alvas Institute of Engineering and technology, Moodabidri
 
Numerical-Solutions-of-Ordinary-Differential-Equations.pptx
SAMUKTHAARM
 
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
Knowledge Representation : Semantic Networks
Amity University, Patna
 

IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Networks using RSS Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3585 DETECTION OF SPOOFING AND JAMMING ATTACKS IN WIRELESS SMART GRID NETWORKS USING RSS ALGORITHM K.Suganthi1,K.Sahana2,G.Santhiya3,S.Swathi4. 1 Assistant Professor Dept. Computer of Science and Engineering, Arasu Engineering College, Tamil nadu, India. 2,3,4 Students Dept. of Science and Engineering, Arasu Engineering College, Tamil nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract- Wireless power grid networks consistofnumerous small home nodes and power production nodes that can collect, and disseminate information for the processing of information of power consumption. Several of these applications involve the communication of sensitive information that must be protected from unauthorized parties. Although the wireless network communicationscould be secured via standard cryptographic methods, the communication patterns alone leak contextual information, which refers to event-related parameters that are inferred without accessing the report contents. Under a global model, all communications within the wireless networksareassumed to be intercepted and collectively analyzed. State-of-the-art countermeasures conceal traffic associated to real events by injecting dummy packets according to a predefined distribution. In these methods, real transmissions take place by substituting scheduled dummy transmissions, which decorrelates the occurrence of an event from the eavesdropped traffic patterns. However, concealment of contextual information comes at the expense of high communication overhead and increased end-to-end delay for reporting events. In this section, we propose a general traffic analysis method using Received Signal Strength for inferring contextual information from jamming attacks and spoofing attacks. Our method is meant as a baseline for evaluating the performance of protection mechanisms with varying underlying assumptions. Therefore, it relies on minimal information, namely the packet interception times, jamming attacks and eavesdroppers’ locations. Key words: SVM, Spoofing, Jamming, contextual information, Traffic analysis 1. Introduction As more wireless and sensor networks are deployed, they will increasingly become tempting targets for malicious attacks. Due to the openness of wireless and sensor networks, they are especially vulnerable to eavesdropping attacks where an attacker forges its identity to masquerade as another device, or even creates multiple illegitimate identities. Eavesdropping attacks are a seriousthreatasthey represent a form of identity compromise and can facilitate a variety of traffic injection attacks, such as evil twin access point attacks. It is thus desirable to detect the presence of eavesdropping and eliminate them from the network. The traditional approach to address eavesdropping attacks is to apply cryptographic authentication. However, authentication requiresadditional infrastructural overhead and computational power associated with distributing, and maintaining cryptographic keys. Due to the limited power and resources available to the wireless devices and sensor nodes, it is not always possible to deploy authentication. In addition, key management often incurs significant human management costs on the network.In this project, we take a different approach by using the physical properties associated with wireless transmissions to detect eavesdropping. Specifically, we propose a scheme for both detecting eavesdropping attacks, as well as localizing the positions of the adversaries performing the attacks. Our approach utilizes the Received Signal Strength (RSS) measured across a set of access points to perform eavesdropping detection and localization. Our scheme does not add any overhead to the wireless devices and sensor nodes.Due to the shared nature of the wireless medium, attackers can gather useful identity information during passive monitoring and further utilize the identity information to launch identity-based attacks, in particular, the two most harmful but easy to launch attacks: 1) eavesdropping attacks and 2) Sybil attacks.Inidentity-based eavesdropping attacks, an attacker can forge its identity to masquerade as another device or even create multiple illegitimate identities in the networks. For instance, in an IEEE 802.11 network, it is easy for an attacker to modify its Media Access Control (MAC) address of network interface card (NIC) to another device through vendor-supplied NIC drivers or open-source NIC drivers. In addition, by masquerading as an authorized wirelessaccesspoint(AP)or an authorized client, an attacker canlaunchdenial-of-service (DoS) attacks, bypass access control mechanisms, or falsely advertise services to wireless clients.Therefore; identity- based attacks will have a serious impact to the normal operation of wireless and sensor networks. It is thus desirable to detect the presence of identity-based attacks and eliminate them from the network. The traditional approach to address identity-based attacks is to apply cryptographic authentication. However, authentication requires additional infrastructural overhead and computational power associated with distributing and maintaining cryptographic keys. Due to the limited power and resources available to the wireless devices and sensor nodes, it is not alwayspossible to deploy authentication.Due to the shared nature of the wireless medium, attackers can gather useful identity informationduringpassivemonitoring and utilize the identity information to launch identity based eavesdropping attacksin wirelessand sensor networks.For
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3586 instance, in an 802.11 network, it is easy for a wireless device to acquire a valid MAC address and masquerade as another device. The IEEE 802.11 protocol suite provides insufficient identity verification during message exchange, including most control and management frames. Therefore, the adversary can utilize this weakness and request various services as if it were another user. Identity-based eavesdropping attacks are a serious threat in the network, because they represent a form of identity compromise and can facilitate a series of traffic injection attacks, including eavesdropping-based attacks. For instance,anadversarycan launch a de authentication attack. After a client chooses an AP for future communication, it must authenticate itself to the AP before the communication session starts. Both the client and the AP are allowed to explicitly request for de authentication to void the existing authentication relationship with each other. Unfortunately, this de authentication message is not authenticated. Therefore, an attacker can spoof this de authentication message, either on behalf of the client or on behalf of the AP. The adversary can persistently repeat this attack and completely prevent the client from transmitting or receiving. Furthermore, an attacker can utilize identity eavesdropping and launch the rogue AP attack against the wireless network. In the rogue AP attack, the adversary first sets up a rogue AP with the same MAC address and service set identifier as the legitimate AP but with a stronger signal. When a station enters the coverage of the rogue AP, the default network configuration will make the station automatically associate with the rogue AP, which has a stronger signal. Then, the adversary can take actions to influence the communication. For example, it can direct fake traffic to the associated station or drop the requests made by the station. Aside from the basic packet-flooding attacks, the adversary can make use of identity eavesdropping to performmoresophisticated flooding attacks on APs, such as probe request, authentication request, and association request flooding attacks. Received Signal Strength is widely available in deployed wireless communication networks, and its values are closely correlated with location in physical space. In addition, RSS is a common physical property used by a widely diverse set of localization algorithms. In spite of its several-meter-level localization accuracy, using RSS is an attractive approach, because it can reuse the existing wireless infrastructure, and it is sufficient to meet the accuracy requirement of most applications. For example, during health care monitoring, a doctor may only need to know in which room the tracked patient resides. Although affected by random noise, environmentalbias,andmultipath effects, the RSS measured at a set of landmarks (i.e., reference points with known locations) is closely related to the transmitter’s physical location and is governed by the distance to the landmarks. The RSS readings at different locations in physical space are distinctive. During the localization process, the following stepswilltake place: 1. A Transmitter sends a packet. Some number of Landmarks observes the packet and records the RSS. 2. Each Landmark forwards the observed RSS from the transmitter to the Server. 3. The Server collects the complete RSS vector for the transmitter and sends the information to a Solver instance for location estimation. 4. The Solver instance performs localization and returns the coordinates of the transmitter back to the Server. 1.1 literature survey Muhammad Akhlaq et al [1]RTSP: An Accurate and Energy- Efficient Protocol for Clock Synchronization in WSNs. Recursive Time Synchronization Protocol (RTSP) which accurately synchronizes all the nodes in a network to a global clock using multi-hop architecture in an energy- efficient way. RTSP Algorithm Used. Reducingthenumberof time synchronization requests through the adaptive re- synchronization interval and aggregationofsynchronization requests. Another approach is Muhammad Akhlaq [2] proposed the study of Statistical Framework for Source Anonymity in Sensor Networks. It introduces the notion of “interval in distinguish ability” and provides a quantitative measure to model anonymity in wireless sensor networks; second, it maps source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. We then analyze existing solutions for designing anonymous sensor networks using the proposed model analyze existing solutions for designing anonymous sensor networks using the proposed model. Anonymity, hypothesis testing, nuisance parameters.We transform the problem from analyzing real-valued sample points to binary codes, which opens the door for coding theory to be incorporated intothe study of anonymous sensor networks. Another approach is Frederik Armknecht and Joao Girao[3] proposed the study of Privacy at link layer..The widespread usage of these technologies comes at the price of location privacy, be it by observing the communication patterns or the interface identifiers. Although a numberofnetworklevel solutions have been proposed, describesanovelapproachto location privacy at the link layer level. Re-synchronization Mechanism. Used in conjunction with a pseudonym mechanism to prevent tracking by active communicating peers, this could be an interesting new direction for our work. Nevertheless, our approach provides privacy at the link layer without significantly undermining the performance of the network. Another approach is Matthias Fruth [4] proposed the study of Probabilistic Model Checking of Contention Resolution in the IEEE 802.15.4 Low-Rate Wireless Personal Area Network Protocol. Verify correctness properties, compare different operation modes of the protocol, and analyze performance and accuracy of different model abstractions.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3587 Used IEEE 802.3 for Ethernet and IEEE 802.11 for Wireless LAN. New scenarios could contain a larger number of stations and more complex behaviors’ ofthestations,suchas transmitting more than one message per station and allowing stations to send and to receive. Another approach is Xi Luo, Xu Ji [5] proposed the study of Location Privacy against Traffic AnalysisAttacks inWireless Sensor Network. Firstly, a random routing scheme (RRS) is proposed to provide path diversity. Secondly, we combine RRS with a dummy packet injection scheme (DPIS) to confuse the adversary by tracing or tracing back the forwarded packet to reach the receiver or source. Finally,an anonymous communication scheme (ACS) is proposed to hide the identities of all nodes that participate in packets transmission. Random Routing. Through the security analysis and performance analysis, we can seeourproposed scheme can effectively prevent the traffic analysis attacks, and has the less delivery time and energy consumption compared Another approach is Ben Greenstein [6] proposed the study of Improving Wireless Privacy with an Identifier FreeLink Layer Protocol. Nearly as efficient as existing schemes such asWPA for discovery, link setup, and datadeliverydespiteits heightened protections; transmission requires only symmetric key encryption and reception requires a table lookup followed by symmetric key decryption. Anonymity. Showed how a link layer could use two mechanisms, Tryst and Shroud, to perform this obfuscation while stillachieving efficient discovery, link establishment, and data transport, and without sacrificing other crucial link layer functions such as higher layer name binding Another approach is Yong Xi [8] proposed the study of Preserving Source Location Privacy in MonitoringBased Wireless Sensor Networks. They propose GROW (Greedy Random Walk), a two-way random walk, i.e., from both source and sink, to reduce the chance an eavesdropper can collect the location information. We improve the delivery rate by using local broadcasting and greedy forwarding. Privacy protection is verified under a backtracking attack model. The message delivery time is a little longer than that of the broadcasting-based approach, but it is still acceptable if we consider the enhanced privacy preserving capabilityof this new approach. GROW Algorithm. Can monitorthetraffic and deduce the approximate locationofmonitoredobjectsin certain situations. Another approach is Celal Ozturk [7] proposed the study of Source Location Privacy in Energy Constrained Sensor Networks. While developing and evaluating our privacy-aware routing protocols; we jointly consider issues of location-privacy as well as the amount of energy consumed by the sensor network. Motivated by the observations, we propose a flexible routing strategy, known as phantom routing, which protects the source’s location. Source-Location Privacy. Our investigationshaveshownthat phantom routing is a powerful technique for protecting the location of the source during sensor transmissions 2. PROPOSED WORK In this proposed work, we build a efficient traffic randomization for hiding contextual information in event- driven WSNs, under a global adversary may study. Ourmain contributions are summarized as follows: This system presents a general traffic analysis method for inferring contextual information that is used as a baseline for comparing methods with varying assumptions and it can obtain the Received Signal Strength in receiver end fromthe signal transmission of the sender. It can calculate the signal variation to obtain the location of the eavesdropper. Our method relies on minimal information, namely packet transmission time and eavesdropping location. This system proposes traffic normalization methods that hide the event location, its occurrence time, and the sink location from global eavesdroppers. Compared to existingapproaches,our methodsreduce the communication and delay overheadsby limiting the injected bogus traffic. This is achieved by constructing minimum connected dominating sets (MCDSs) and MCDSs with shortest paths to the sink (SSMCDSs). Here a loose transmission coordination scheme that reduces the end to end delay for the reporting events. The schemes in LTC cannot be combined with each other these techniques send the optimal packets appropriate times or through appropriate paths. Advantages:  Overcome the drawback of eavesdropper’s localization.  The proposed system reduces the communication and delay overheads by limiting the injected bogus traffic.  The proposed system reducesthe forwardingdelay Fig. 1 System Architecture Fig. 1 shows the architecture of our model.users send the message to the other user using WPGN(wireless power grid network).At the same time eavesdropper view the message
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3588 from WPGN. So that hacker can easily gather the information. Attacker can be detected based on the traffic analysis using RSS algorithm(received signal strength) sometimes referred as RSSI (Received signal strength indicator) is a measurement of the power present in a received radio signal. The nodes used by the Accurate WiFi Location Monitor and Bluetooth Beacon Tracker arecapable of measuring the RSS of nearby Wi-Fi and BLE devices.The RSS values are measured in dBm and have typical negative values ranging between 0 dBm (excellent signal) and -110 dBm (extremely poor signal). By using RSS we can analysis both active and passive attack .finally the location of the hacker can be analysed and mitigation them. 2.1 PROBLEM FORMULATION To formulate our problem, Moreover, our attack strategy, RSS, is designed on the basis of the features of jamming and spoofing attacks. The attack effects can be counted in either probability or return values the operating principles of jamming and spoofing attacks in SVM. This shows the characteristicsof SVM the variouspower levelsarerequired for classify the attack strategy. The threshold value can determine the location of attacker. The height of each cube illustrates the power level required by adversaries. The distinctness of the heights shows the variety of demanded powers. The adversarial positions are marked in the figure. In addition, represents a SVM frame structure that consists of a sensing and a transmission message. In SVM, the vulnerabilities often address. The periodic sensing stage in which the secondary usersare searching available location. Max [V wtotal; Prtotal] = Max [Xs (i) V w (i);Y s(i) Pr(i)] (1) Where Xs (i)V w (i) =Xs(i)=0V w(i) +Xs(i)=1V w(i) (2) and Ys(i)Pr(i) =Ys(i)=0Pr(i) -Ys(i)=1Pr(i) (3) Under a power constraint (Pw).Furthermore, our approach aims to find out an optimal adversarial plan when the level of available power Pw is fixed.To consider the total return value, we give the objective function Of the problem in Eq. (1), which shows that the goal is to maximize the pair (V wtotal, Prtotal) under the given power constraint Pw. Given a binary function s(i), s(i) = 1 when J attack is applied and s(i) = 0 when S attack is applied.The total attack return value V wtotal is a sum of all return values from all frequency spectrums, expressed in Eq. (2).Additionally, the adversarial strategy will depend onthe attack success probabilities. The method of calculating total Prtotal is shown in Eq. (3) that is a production of all probabilities.Using our proposed approach can dynamically switch attack methods between jamming and spoofing in order to reach the Optimum attack performance and mitigate them. Generate Algorithm: Notations used in algorithms are given as follows: Pk I;j denotes The probability of ith frequency spectrum with the power value j. k is the index number. V ki;j denotesthe valueweight of ith frequency spectrum with the power value j. Additionally, we define an operator “_” for calculating probabilities and value weights, which is used for the purpose of pair alternatives. The_ definition is given in 9 two pairs (Pi, Vi) and (Pj , Vj ). then (Pi, Vi)_ (Pj , Vj ) = (Pi _ Pj , Vi + Vj ) 9 two pair lists Li, Lj , then Li _ Lj will _ all random pairs from Li and Lj . RSS, is designed to generate a D-Table. Input of this algorithm is a Basic Table (B-Table) that maps all the values of Pr and Vw for each spectrum within all power constraints. In the D-Table, all optimal solutionswith Parameters Pr and Vw are provided, which represents an attack Strategy plan. An efficient attack strategy to WSGN can be obtained by selecting one solution matching the attack preferences. The attack plan generated from MAS algorithm is an optimal solution, which relies on Theorem 5.1. The proof of generation of the RSS algorithm Theorem 5.1 is also given below. Algorithm 5.1 RECEIVED SIGNAL STRENGTH (RSS) Algorithm Require: Attacker location Ensure: Mitigation of attack 1: A1;j M1;j 2: for 8 Fi, i>1 do 3: for 8 Power j do 4: for 8 Power k in Mi;k do 5: if Ai�1;j�k != null then 6: Ai;j = Ai�1;j�k _ M i;k 7: end if 8: end for 9: Mitigation of the attacker applying Algorithm 5.2 10: end for 11: end for 12: Return Location of the attacker (contains the attack strategy plan) 2.2 METHODOLOGY 1. Wireless Network Formation: Two Bluetooth devices are considered with the code application come into each other communication range, in order to set up a communication link.This simple“single- hop” network is called a piconet. Bluetooth technology is
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3589 used for both neighbor discoveryanddatacommunicationin the created piconets 2. Data collection: Detection ofEavesdroppingAttacks: Using received signal strength (RSS)-based spatial correlation, utilizing spatial information to addressspoofing attack.unique power to not only identify the presence of these attacks but also localize adversaries.An added advantage of employing spatial correlation will not require any additional cost or modification to the wireless devices themselves. The above analysis provides the theoretical support of using the RSS-based spatial correlation inherited from wireless nodes to perform spoofing attack detection. 3. DETERMINATION OF NUMBER OF ATTACKERS: To determining the number of attackers becomes a multiclass detection problem and is similar to determining how many clusters exist in the RSS readings.A Silhouette Plot is a graphical representation of a cluster that used to determine the number of attackers. The System Evolution method performs well under difficult cases, such as System Evolution and SILENCE. Support Vector Machinesto classify the number of the spoofing attackers. it can combine the intermediate results. 4. MITIGATION OF SPOOFING ATTACKS: In this module, using traffic correlation analysis, the spoofing attackers should be monitored and mitigated from the wireless networks .It does not affect the wireless network legitimate mobile nodes by means of proposed novel approach for mitigating the multiple spoofing attacks. 3. EXPERIMENTAL RESELT A set of experiments carried out on spoofing and jamming attack .The performance evaluation of the system is performing using this dataset. The screenshots of various phases of Detection of spoofing and jamming attack are as follows: FIG.2 REPRESENT THE NETWORK FORMATION AND THE EXCUTION SERVICE FIG-3 REPRESENT THE MOBILE NODE FORMATION FIG-4 REPRESENT THE MESSAGE PASSING THROW ONE NODE TO ANOTHER NODE FIG-5 REPRESENT THE DETECTION OF ATTACKS FIG-6 REPRESENT THE MESSAGE CAN RECEIVED BY THE ATTACKER
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3590 FIG-7 REPRESENT LOCATION OF THE ATTACKER (LOCALIZATION) FIG-8 REPRESENT THE MITIGATION OF ATTACKS 4. CONCLUSION In this work, here the system proposed to use received signal strength based spatial correlation,aphysicalproperty associated with each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in wireless networks. It provided theoretical analysis of using the spatial correlation of RSS inherited from wirelessnodesfor attackdetection.Itderived the test statistic based on the cluster analysis of RSS readings. Our approach can detect the presence of attacksas well as determine the number of adversaries, spoofing the same node identity, so that we can localize any number of attackers and eliminate them. 5. FUTURE ENHANCEMENT In addition to the spoofing attacks, the insider attackswillbe considered in future to mitigate and identify the legitimate user resemblance. The cryptographic techniques should be used in future if the eavesdropper obtained the data REFERENCES: [1] J. Muhammad Akhlaq.”IEEE Std. 1588-2008", IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, 2008. [2] J. Muhammad Akhlaq “Statistical Framework for Source Anonymity in Sensor Networks", Proc. IEEE Globe Com, 2013. [3] Frederik Armknecht and Joao Girao, IEEE Standard 802.11. IEEE standard for information technology - telecommunications and information exchange between systems -local and metropolitan area networks - specific requirements, part 11: WirelessLAN medium accesscontrol (MAC) and physical layer (PHY) specifications, 2007. [4]MatthiasFruth, "IEEE Standard802.15.4–2003: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)", IEEE Computer Society, 2007 [5] Xi Luo, Xu Ji,"A Novel Scheme for Protecting Receiver's Location Privacy in Wireless SensorNetworks", Proc.ofIEEE Teansactions on Wireless Communications, vol. 7, no. 10, October 2010 [6] Ben Greenstein, “Improving Wireless Privacy with an Identifier-Free Link Layer Protocol, 2008 [7] C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy constrained sensor network routing," in SASN '04: Proceedingsof the 2nd ACMworkshoponSecurity of ad hoc and sensor networks, (New York, NY, USA), pp. 88- 93, ACM, 2004 [8]Yong Xi, "Preserving source location privacy in monitoring-based wireless sensornetworks."inIPDPS,IEEE, 2006. BIOGRAPHIES: Suganthi.K recehived B.TECH Degree in Information Technology from Anna University affiliated college in 2005and M.Tech Degree from Prist Universityin2014. She is currently working as Assistant Professor in the Dept. of Computer Science and Engineering, Arasu Engineering College, Kumbakonam. Sahana.K pursuing B.E Degree in the stream of computer science and engineering at Arasu engineering college kumbakonam Santhiya.G pursuing B.E Degreeinthestream of computer science and engineering at Arasu engineering college kumbakonam Swathi.S pursuing B.E Degree in the stream of computer science and engineering at Arasu engineering college kumbakonam