SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 1
WIRELESS DEVICE POSITIONINGAND FINDING
INTRUDER USING RSS
Franklin Alex Joseph Sharmila
Asst. Professor/EEE Asst.Professor/CSE
St. Joseph’s college of engineering and technology, Tanjore. St. Joseph’s college of engineering and technology,
afranklin.alex@gmail.com rsharmi2415@gmail.com
Abstract - Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.
The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less
secure than wired connections (such as Ethernet) because an intruder does not need a physical connection. By any
chance if the wireless device attacked by intruder it is hard to locate the device. Locating a wireless device in a Wi-Fi
network by calculating the distance of each node and localize the wireless accurately. A common measure to deter
unauthorized users involves hiding the access point's name by disabling the SSID broadcast. While effective against the
casual user, it is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID
query. Another method is to only allow computers with known MAC addresses to join the network. The robust location
estimation assumes the reference location in the target environment, the proposed location system maps the input to the
physical location using RSS algorithm. In SSID is the application software used to list the set of wireless device available
in the surrounding and it used to create a gpx file. Converting gpx file in a table format for further distance estimation.
Keywords- Wi-Fi, mobile phone positioning, RSS (Received Signal Strength),SSID(Signal Strength Identifier),
MAC (Media Access Control) .
I.INTRODUCTION
Wireless device positioning system proposes an attack-resistant that uses a robust location estimation model. Unlike the
product model, the proposed algorithm assumes that reliable observations may be any RSS or RSS combinations that
belongs to the complete set. In Wi-Fi network it captures more robust location information because it offers a tolerance of
all possible attack conditions. And it includes conducted in an actual Wi-Fi network. Actual Wi-Fi RSS data was collected
to build a location system and a linear attack model that simulated various attacks on RSS. It includes the module for Xml
to RDMS file, Location bases RSS, Intrusion Detection and Analysis. Many wireless localization algorithms based on
different physical characteristics including received signal strength (RSS), time of flight, and angle or directional of arrival.
Of these characteristics, RSS is the most attractive because reading RSS is economical and compatible with existing
wireless networks.
Since estimations of position are often required for vital location-based services, such as assessment of secret
document, positioning systems are becoming tempting targets for attacks. An attacker could easily prevent RSS based
location systems from working correctly by altering the propagation environment, modifying the RSS readings,
manipulating the transmitted power, or broadcasting false messages. Unfortunately, traditional security methods such as
authentication and encryption keys cannot isolate physical RSS-based attacks, making defense against such attacks difficult.
For this reason, researchers have devoted considerable research to designing robust location systems that provide valid
location information resistant to malicious attacks. Most existing IDS are optimized to detect attacks with high accuracy.
However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has
been done to analyze IDS in Wi-Fi network. RSS is the most attractive because reading RSS is economical and compatible
with existing wireless networks. The assignment of the alert to an existing component is not accepted in any case, only if
the quality of the model increases or does not decrease too much. The personal network security access of the wireless
device will not be recognized and it will not be open in wireless network infrastructure.
IDS was not containing the robust location identification so not efficient to get the cleaned data and normal data.
Distance estimation value of the wireless device shown the approximate target destination. IDS optimize to detect attack in
high accuracy in wireless network if only the quality rate of the device is in high range. In this proposed system, The Robust
location estimation system propose a novel technique for proposed attack-resistant which is based on a dynamic,
probabilistic model of the current attack situation. To evaluate the effectiveness of the proposed attack-resistant location by
using RSS algorithm, this included experiments conducted in an actual. Wi-Fi network and here analyzed three different
data sets and showed that xml file conversion, Filtering individual devices by MAC address, experimental analysis using
graph. In all cases, the amount of data could be reduced substantially. Actual Wi-Fi RSS data was collected to build a
location estimation system and a linear attack model that simulated various attacks on RSS.
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 2
Using RSS was present the robust location estimation so efficiently get the cleaned data and normal data. This location
estimation system was present RSS algorithm so predict the malicious attack in wireless network. Map the device in the
infrastructure accurately and used to find the intruded device by giving threshold value manually.
II. PROPOSED ALGORITHM
A. PROBLEM FORMULATION:
The wireless device senses N base stations (BSs), then RSS can be represented by a vector X with N elements as
X=(x1,x2,···,xN), where xn is the RSS from the nth BS. An RSS-based location system regards X as an input and outputs the
estimated location through a previously constructed RSS-location relationship. However, the presence of an attacker or
unreliable BSs may make some xn very unreliable and inaccurately estimate the position of the user. The problem in secure
localization is how to accurately locate the user given X, which contains both un attacked (reliable) and attacked
(unreliable) measurements.
B.DISTANCE ESTIMATION:
The RSS value from the insider application and also the quality rate of individual wireless device are stored in a
XML based log file with the identity of each device (SSID), MAC Address, speed, longitude point, latitude point, time and
date of the device when it is logged. The XML log files are then converted into a RDBMS table for the user recognition.
‘BETWEEN’ is the keyword used the get the value from the entity to display it in a table. If we want to get the value of
SSID name from the log file means,
Stringname Contains("<SSID>") ssidname = Between(Stringname, "<SSID>", "</SSID>");
From these we can get the values from the log file and implement it into the table. To evaluate the distance of the
available device in the wi-fi network, pick the RSS value and quality rate from the table for each device available in the
slot. The appropriate distance can be evaluate
rss * rss / quality * 1.92 / 2
By the formulae given. The received signal strength give the radio signal frequency and the quality rate gives the
performance of the wireless device and range of usage based on the device quality. After these estimation the distance can
be calculated and displayed in sq.ft
III. EXPERIMENTAL SETUP AND RESULTS
A. XML TO RDBMS FILE.
The user can be entering into the Wi-Fi user will log on to the services/ then the user will use the services. The
authorized user will be entered into the Wi-Fi services unauthorized user cannot be accessing the services. The services can
be based on the device available currently. Then take the overall log files of the user enter into the Wi-Fi based services and
clustered the user enter into the Wi-Fi services. These clustering processes of the user log files can be processing as the unit
process. The input file in the form of xml files and the file can be clustered and the file in the form of RDMS format.
B. FILE LOCATION BASED ON RSS.
In this pattern extraction the direction of the path can be identified and accessing the data in the online services in
the WI-FI and identified in the cleaned training data. In this path direction the particular services can be provided and the
particular data can be passed by the way of the online based services and it can be auditing the entire clean data and identify
the pattern of the path and also identify any other possible attacks can be identified and getting the location information in
this particular model based on RSS.
C. INTRUSION DETECTION
The localization information of the path in the model and getting information in the clean dataset and also identify
the possible alert in the online services can be identified and other alert based on the attack can be identified by the possible
attacks by using alert services. In this alert based services the different types of alert based on the online services of the data
sending path in the services. Comparing the different messages and it can be stored in the buffer. Then the possible location
information can be identified by this model and also the possible attacks in the Wi-Fi based online services and increasing
the performance of the received signal of the sending data and the possible attacks can be reduced in the online services
and sending the secured data without any major attack in the services.
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 3
In that particular time thousands of attacks can be spread it can be reduced by inclusive disjunction model and
increased the performance of the online services in the WI-FI. e.g. DDOS Attack in the online services.
D. PERFORMANCE ANALYSIS
In this the localization information can be identified by the cleaned dataset and identify the path then the possible
attacks can be reduced in the WI-FI based n online services and finding the path which can be in the secured online services
based on WI-FI.in this overall attack can be identified in the cleared dataset and optimized location can be identified
without any external attack in the online services. Compared to the other network services the performance can be increased
in the online services compatible and increased the computation performance with online services. Now the performance of
the computation time can be less compared to all other networking services and increased the received signal strength.
Fig. 1. System architectural diagram for wireless device positioning in Wi-Fi network.
IV. CONCLUSION:
Wireless positioning in Wi-Fi network system proposes an attack-resistant robust location estimation that uses a
probabilistic inclusive disjunction model. The advantage of this approach is that, as a small probability contributes little to
the inclusive disjunction model, this model allows an attacked observation to play a less significant role in the localization
process, thus achieving more robust location estimations under security threats. To evaluate the effectiveness of this attack-
resistant location estimation analyzed actual Wi-Fi RSS data, developed a robust location system, and simulated various
attacks on RSS using a linear attack model. Finally the wireless positioning approach achieved better robustness than
cluster based, distance based, and device based under various attacks on RSS.
V. FUTURE ENHANCEMENT:
In future the robust location of a wireless device in a wireless network can be reach the distance in a high range.
By increasing the range of Wi-Fi, And to localize any device which is in too far of distance. A wireless access point (AP) is
a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually
connects to a router (via a wired network) if it's a standalone device, or is part of a router itself. In future this robust location
estimation is applied in a sense means then the localization of the intruded device in a wireless network can be positioned
easily. Most jurisdictions have only a limited number of frequencies legally available for use by wireless networks.
However, the limited number of frequencies becomes problematic in crowded downtown areas with tall buildings using
multiple WAPs. In such an environment, there is an overcome need for signal overlap becomes an issue causing
interference, which results in signal drop page and data errors. Quality rate of the wireless device can also be localized
accurately.
AUTHENTICATOR
CONVERTING XML TO
RDMS FILE
FINDING THE RSS BASED LOCATION INFORMATION FOR
EFFICIENT TRANSFER OF DATA
ATTACKS CAN
BE BASED ON
INTRUSION
DETECTION
ALERT
ANALYSIS AND
IDENTIFIED THE
OPTIMISED
SOLUTION &
DISPLAY GRAPH
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 4
REFERENCES
[1] J. Cleary et al., “High precision traffic measurement,” IEEE Communication Mag., vol. 40, no. 3, pp. 167–173, Mar. 2002.
[2] P. Ferrari, A. Flammini, D. Marioli, and A. Taroni, “A new distributed instrument for real time Ethernet networks: Experimental
tests and characterization,” in Proc. ETFA2007, IEEE Int. Conf. Emerging Technologies and Factory Automation, Patras, Greece,
2007, pp. 524–531.
[3] Gold smith A J, Wicker S B. Design Challenges for Energy Constrained Ad hoc Wireless Network [ J ]. IEEE Wireless
Communications, 2002, 9(8):8 26
[4] DAI S J, JING X R, LI L N. Research and analysis on routing protocols for wireless sensor networks [A]. Communications, Circuits
and Systems, 2005. Proceedings[C]. 2005 International Conference on Colume 1, 27-30 May 2005. Page(s):407 – 411
[5] S. Vitturi, “On the use of Ethernet at low level of factory communication systems,” Comp. Std. and Interfaces, vol. 23, pp. 267- 277,
2001.
[6] OMRON Corporation, SYSMAC CS/CJ Series Ethernet Units Operational Manual. Kyoto, Japan: cat. no. W343-E1-06, 2005.
[7] L. Yong, M.J Lee, T.N. Saadawi. A Bluetooth scatternet-route structure for multi-hop adhoc networks. Selected Areas in
Communications. IEEE Journal, Vol.21, pages 229-239, Issue: 2, Feb. 2003
[8] X. Zhang, G.F. Riley. Bluetooth Simulations for Wireless Sensor Networks using GTNetS. 12th IEEE/ACM International
Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Oct. 2004.
[9] J. Elson and D. Estrin. Time Synchronization for Wireless Sensor Networks. Int’l. Parallel and Distrib. Processing Symp., Wksp.
Parallel and Distrib. Comp. Issues in Wireless Networks and Mobile Comp., San Francisco, CA, Apr. 2001.

More Related Content

What's hot (20)

PDF
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
PDF
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
AM Publications
 
PDF
IJAEIT 20
Jackson Christian
 
PDF
Data Prevention from Network Hacking
ijtsrd
 
PDF
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
PDF
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
PDF
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
PDF
710201940
IJRAT
 
PDF
Robust encryption algorithm based sht in wireless sensor networks
ijdpsjournal
 
PDF
A Comparative Study for Source Privacy Preserving and Message Authentication ...
AM Publications
 
PDF
Behavioral Malware Detection in Dtn Using Intrusion Detection System
theijes
 
PDF
International Journal of Engineering Research and Development
IJERD Editor
 
PDF
C0363012014
inventionjournals
 
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
LogicMindtech Nologies
 
PDF
Modelling of A Trust and Reputation Model in Wireless Networks
ijeei-iaes
 
PDF
IRJET- Robustness Strategy for Securing Data from Cyber Attacks
IRJET Journal
 
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
AM Publications
 
Data Prevention from Network Hacking
ijtsrd
 
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
710201940
IJRAT
 
Robust encryption algorithm based sht in wireless sensor networks
ijdpsjournal
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
AM Publications
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
theijes
 
International Journal of Engineering Research and Development
IJERD Editor
 
C0363012014
inventionjournals
 
Secure data aggregation technique for wireless sensor networks in the presenc...
LogicMindtech Nologies
 
Modelling of A Trust and Reputation Model in Wireless Networks
ijeei-iaes
 
IRJET- Robustness Strategy for Securing Data from Cyber Attacks
IRJET Journal
 

Viewers also liked (11)

PPTX
Оценка процесса обслуживания как фактора эффективности воронки продаж
AssociationAMKO
 
DOC
C.V Mrs A Gater
Annalisa Gater
 
PDF
Whitepaper Ga registratiedruk en administratie laten te lijf
Xavier Geerdink
 
PDF
Triadimenol 55219-65-3-api
Triadimenol-55219-65-3-api
 
PPT
Google Project
wheelrzzzz
 
PDF
SSR Damping Using GCSC and TCSC in Wind Farms
AM Publications
 
PDF
Pefloxacin 70458-92-3-api
Pefloxacin-70458-92-3-api
 
PDF
role of distributed generation
Jitendra Bhadoriya
 
PPTX
Sari-Sari Store Festival: Through the years
Prworks VisMin
 
PDF
CA 3.04 Heliocentrism
Stephen Kwong
 
DOCX
Dziwana Matilda Shawa CV 1
Dziwana Shawa
 
Оценка процесса обслуживания как фактора эффективности воронки продаж
AssociationAMKO
 
C.V Mrs A Gater
Annalisa Gater
 
Whitepaper Ga registratiedruk en administratie laten te lijf
Xavier Geerdink
 
Triadimenol 55219-65-3-api
Triadimenol-55219-65-3-api
 
Google Project
wheelrzzzz
 
SSR Damping Using GCSC and TCSC in Wind Farms
AM Publications
 
Pefloxacin 70458-92-3-api
Pefloxacin-70458-92-3-api
 
role of distributed generation
Jitendra Bhadoriya
 
Sari-Sari Store Festival: Through the years
Prworks VisMin
 
CA 3.04 Heliocentrism
Stephen Kwong
 
Dziwana Matilda Shawa CV 1
Dziwana Shawa
 
Ad

Similar to WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS (20)

PDF
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Kumar Goud
 
PDF
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
IRJET Journal
 
PDF
A030101001006
theijes
 
PDF
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET Journal
 
PDF
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Conference Papers
 
PDF
Mobile security using wi fi signal strength
eSAT Publishing House
 
PDF
IJSRED-V2I5P18
IJSRED
 
PDF
Lz3421532161
IJERA Editor
 
PDF
Lz3421532161
IJERA Editor
 
PDF
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
CSCJournals
 
PPTX
Indoor navigation system
Abdelrhman El Menyawe
 
PDF
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
IRJET Journal
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
PDF
International Journal of Computer Science and Security Volume (1) Issue (3)
CSCJournals
 
PDF
IRJET- Indoor Positioning System
IRJET Journal
 
PDF
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET Journal
 
PDF
Preparation gade and idol model for preventing multiple spoofing attackers in...
prjpublications
 
PPTX
Advance Technology
Export Promotion Bureau
 
PDF
A survey on evil twin detection methods for wireless local area network
IAEME Publication
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Kumar Goud
 
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
IRJET Journal
 
A030101001006
theijes
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET Journal
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Conference Papers
 
Mobile security using wi fi signal strength
eSAT Publishing House
 
IJSRED-V2I5P18
IJSRED
 
Lz3421532161
IJERA Editor
 
Lz3421532161
IJERA Editor
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
CSCJournals
 
Indoor navigation system
Abdelrhman El Menyawe
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
International Journal of Computer Science and Security Volume (1) Issue (3)
CSCJournals
 
IRJET- Indoor Positioning System
IRJET Journal
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET Journal
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
prjpublications
 
Advance Technology
Export Promotion Bureau
 
A survey on evil twin detection methods for wireless local area network
IAEME Publication
 
Ad

More from AM Publications (20)

PDF
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
PDF
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
PDF
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
PDF
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
PDF
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
PDF
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
PDF
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
PDF
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
PDF
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PDF
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
PDF
INTELLIGENT BLIND STICK
AM Publications
 
PDF
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
PDF
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
PDF
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
PDF
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
PDF
DETECTION OF MOVING OBJECT
AM Publications
 
PDF
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PDF
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
PDF
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
PDF
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
INTELLIGENT BLIND STICK
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 

Recently uploaded (20)

PPTX
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PPTX
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
PDF
20ES1152 Programming for Problem Solving Lab Manual VRSEC.pdf
Ashutosh Satapathy
 
PDF
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PDF
REINFORCEMENT LEARNING IN DECISION MAKING SEMINAR REPORT
anushaashraf20
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PDF
WD2(I)-RFQ-GW-1415_ Shifting and Filling of Sand in the Pond at the WD5 Area_...
ShahadathHossain23
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PDF
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
PPT
Footbinding.pptmnmkjkjkknmnnjkkkkkkkkkkkkkk
mamadoundiaye42742
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
Distribution reservoir and service storage pptx
dhanashree78
 
PPTX
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PPTX
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
PDF
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
Design Thinking basics for Engineers.pdf
CMR University
 
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
20ES1152 Programming for Problem Solving Lab Manual VRSEC.pdf
Ashutosh Satapathy
 
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
REINFORCEMENT LEARNING IN DECISION MAKING SEMINAR REPORT
anushaashraf20
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
WD2(I)-RFQ-GW-1415_ Shifting and Filling of Sand in the Pond at the WD5 Area_...
ShahadathHossain23
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
methodology-driven-mbse-murphy-july-hsv-huntsville6680038572db67488e78ff00003...
henriqueltorres1
 
Footbinding.pptmnmkjkjkknmnnjkkkkkkkkkkkkkk
mamadoundiaye42742
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
Distribution reservoir and service storage pptx
dhanashree78
 
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 

WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 1 WIRELESS DEVICE POSITIONINGAND FINDING INTRUDER USING RSS Franklin Alex Joseph Sharmila Asst. Professor/EEE Asst.Professor/CSE St. Joseph’s college of engineering and technology, Tanjore. St. Joseph’s college of engineering and technology, [email protected] [email protected] Abstract - Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less secure than wired connections (such as Ethernet) because an intruder does not need a physical connection. By any chance if the wireless device attacked by intruder it is hard to locate the device. Locating a wireless device in a Wi-Fi network by calculating the distance of each node and localize the wireless accurately. A common measure to deter unauthorized users involves hiding the access point's name by disabling the SSID broadcast. While effective against the casual user, it is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID query. Another method is to only allow computers with known MAC addresses to join the network. The robust location estimation assumes the reference location in the target environment, the proposed location system maps the input to the physical location using RSS algorithm. In SSID is the application software used to list the set of wireless device available in the surrounding and it used to create a gpx file. Converting gpx file in a table format for further distance estimation. Keywords- Wi-Fi, mobile phone positioning, RSS (Received Signal Strength),SSID(Signal Strength Identifier), MAC (Media Access Control) . I.INTRODUCTION Wireless device positioning system proposes an attack-resistant that uses a robust location estimation model. Unlike the product model, the proposed algorithm assumes that reliable observations may be any RSS or RSS combinations that belongs to the complete set. In Wi-Fi network it captures more robust location information because it offers a tolerance of all possible attack conditions. And it includes conducted in an actual Wi-Fi network. Actual Wi-Fi RSS data was collected to build a location system and a linear attack model that simulated various attacks on RSS. It includes the module for Xml to RDMS file, Location bases RSS, Intrusion Detection and Analysis. Many wireless localization algorithms based on different physical characteristics including received signal strength (RSS), time of flight, and angle or directional of arrival. Of these characteristics, RSS is the most attractive because reading RSS is economical and compatible with existing wireless networks. Since estimations of position are often required for vital location-based services, such as assessment of secret document, positioning systems are becoming tempting targets for attacks. An attacker could easily prevent RSS based location systems from working correctly by altering the propagation environment, modifying the RSS readings, manipulating the transmitted power, or broadcasting false messages. Unfortunately, traditional security methods such as authentication and encryption keys cannot isolate physical RSS-based attacks, making defense against such attacks difficult. For this reason, researchers have devoted considerable research to designing robust location systems that provide valid location information resistant to malicious attacks. Most existing IDS are optimized to detect attacks with high accuracy. However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has been done to analyze IDS in Wi-Fi network. RSS is the most attractive because reading RSS is economical and compatible with existing wireless networks. The assignment of the alert to an existing component is not accepted in any case, only if the quality of the model increases or does not decrease too much. The personal network security access of the wireless device will not be recognized and it will not be open in wireless network infrastructure. IDS was not containing the robust location identification so not efficient to get the cleaned data and normal data. Distance estimation value of the wireless device shown the approximate target destination. IDS optimize to detect attack in high accuracy in wireless network if only the quality rate of the device is in high range. In this proposed system, The Robust location estimation system propose a novel technique for proposed attack-resistant which is based on a dynamic, probabilistic model of the current attack situation. To evaluate the effectiveness of the proposed attack-resistant location by using RSS algorithm, this included experiments conducted in an actual. Wi-Fi network and here analyzed three different data sets and showed that xml file conversion, Filtering individual devices by MAC address, experimental analysis using graph. In all cases, the amount of data could be reduced substantially. Actual Wi-Fi RSS data was collected to build a location estimation system and a linear attack model that simulated various attacks on RSS.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 2 Using RSS was present the robust location estimation so efficiently get the cleaned data and normal data. This location estimation system was present RSS algorithm so predict the malicious attack in wireless network. Map the device in the infrastructure accurately and used to find the intruded device by giving threshold value manually. II. PROPOSED ALGORITHM A. PROBLEM FORMULATION: The wireless device senses N base stations (BSs), then RSS can be represented by a vector X with N elements as X=(x1,x2,···,xN), where xn is the RSS from the nth BS. An RSS-based location system regards X as an input and outputs the estimated location through a previously constructed RSS-location relationship. However, the presence of an attacker or unreliable BSs may make some xn very unreliable and inaccurately estimate the position of the user. The problem in secure localization is how to accurately locate the user given X, which contains both un attacked (reliable) and attacked (unreliable) measurements. B.DISTANCE ESTIMATION: The RSS value from the insider application and also the quality rate of individual wireless device are stored in a XML based log file with the identity of each device (SSID), MAC Address, speed, longitude point, latitude point, time and date of the device when it is logged. The XML log files are then converted into a RDBMS table for the user recognition. ‘BETWEEN’ is the keyword used the get the value from the entity to display it in a table. If we want to get the value of SSID name from the log file means, Stringname Contains("<SSID>") ssidname = Between(Stringname, "<SSID>", "</SSID>"); From these we can get the values from the log file and implement it into the table. To evaluate the distance of the available device in the wi-fi network, pick the RSS value and quality rate from the table for each device available in the slot. The appropriate distance can be evaluate rss * rss / quality * 1.92 / 2 By the formulae given. The received signal strength give the radio signal frequency and the quality rate gives the performance of the wireless device and range of usage based on the device quality. After these estimation the distance can be calculated and displayed in sq.ft III. EXPERIMENTAL SETUP AND RESULTS A. XML TO RDBMS FILE. The user can be entering into the Wi-Fi user will log on to the services/ then the user will use the services. The authorized user will be entered into the Wi-Fi services unauthorized user cannot be accessing the services. The services can be based on the device available currently. Then take the overall log files of the user enter into the Wi-Fi based services and clustered the user enter into the Wi-Fi services. These clustering processes of the user log files can be processing as the unit process. The input file in the form of xml files and the file can be clustered and the file in the form of RDMS format. B. FILE LOCATION BASED ON RSS. In this pattern extraction the direction of the path can be identified and accessing the data in the online services in the WI-FI and identified in the cleaned training data. In this path direction the particular services can be provided and the particular data can be passed by the way of the online based services and it can be auditing the entire clean data and identify the pattern of the path and also identify any other possible attacks can be identified and getting the location information in this particular model based on RSS. C. INTRUSION DETECTION The localization information of the path in the model and getting information in the clean dataset and also identify the possible alert in the online services can be identified and other alert based on the attack can be identified by the possible attacks by using alert services. In this alert based services the different types of alert based on the online services of the data sending path in the services. Comparing the different messages and it can be stored in the buffer. Then the possible location information can be identified by this model and also the possible attacks in the Wi-Fi based online services and increasing the performance of the received signal of the sending data and the possible attacks can be reduced in the online services and sending the secured data without any major attack in the services.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 3 In that particular time thousands of attacks can be spread it can be reduced by inclusive disjunction model and increased the performance of the online services in the WI-FI. e.g. DDOS Attack in the online services. D. PERFORMANCE ANALYSIS In this the localization information can be identified by the cleaned dataset and identify the path then the possible attacks can be reduced in the WI-FI based n online services and finding the path which can be in the secured online services based on WI-FI.in this overall attack can be identified in the cleared dataset and optimized location can be identified without any external attack in the online services. Compared to the other network services the performance can be increased in the online services compatible and increased the computation performance with online services. Now the performance of the computation time can be less compared to all other networking services and increased the received signal strength. Fig. 1. System architectural diagram for wireless device positioning in Wi-Fi network. IV. CONCLUSION: Wireless positioning in Wi-Fi network system proposes an attack-resistant robust location estimation that uses a probabilistic inclusive disjunction model. The advantage of this approach is that, as a small probability contributes little to the inclusive disjunction model, this model allows an attacked observation to play a less significant role in the localization process, thus achieving more robust location estimations under security threats. To evaluate the effectiveness of this attack- resistant location estimation analyzed actual Wi-Fi RSS data, developed a robust location system, and simulated various attacks on RSS using a linear attack model. Finally the wireless positioning approach achieved better robustness than cluster based, distance based, and device based under various attacks on RSS. V. FUTURE ENHANCEMENT: In future the robust location of a wireless device in a wireless network can be reach the distance in a high range. By increasing the range of Wi-Fi, And to localize any device which is in too far of distance. A wireless access point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) if it's a standalone device, or is part of a router itself. In future this robust location estimation is applied in a sense means then the localization of the intruded device in a wireless network can be positioned easily. Most jurisdictions have only a limited number of frequencies legally available for use by wireless networks. However, the limited number of frequencies becomes problematic in crowded downtown areas with tall buildings using multiple WAPs. In such an environment, there is an overcome need for signal overlap becomes an issue causing interference, which results in signal drop page and data errors. Quality rate of the wireless device can also be localized accurately. AUTHENTICATOR CONVERTING XML TO RDMS FILE FINDING THE RSS BASED LOCATION INFORMATION FOR EFFICIENT TRANSFER OF DATA ATTACKS CAN BE BASED ON INTRUSION DETECTION ALERT ANALYSIS AND IDENTIFIED THE OPTIMISED SOLUTION & DISPLAY GRAPH
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 4 REFERENCES [1] J. Cleary et al., “High precision traffic measurement,” IEEE Communication Mag., vol. 40, no. 3, pp. 167–173, Mar. 2002. [2] P. Ferrari, A. Flammini, D. Marioli, and A. Taroni, “A new distributed instrument for real time Ethernet networks: Experimental tests and characterization,” in Proc. ETFA2007, IEEE Int. Conf. Emerging Technologies and Factory Automation, Patras, Greece, 2007, pp. 524–531. [3] Gold smith A J, Wicker S B. Design Challenges for Energy Constrained Ad hoc Wireless Network [ J ]. IEEE Wireless Communications, 2002, 9(8):8 26 [4] DAI S J, JING X R, LI L N. Research and analysis on routing protocols for wireless sensor networks [A]. Communications, Circuits and Systems, 2005. Proceedings[C]. 2005 International Conference on Colume 1, 27-30 May 2005. Page(s):407 – 411 [5] S. Vitturi, “On the use of Ethernet at low level of factory communication systems,” Comp. Std. and Interfaces, vol. 23, pp. 267- 277, 2001. [6] OMRON Corporation, SYSMAC CS/CJ Series Ethernet Units Operational Manual. Kyoto, Japan: cat. no. W343-E1-06, 2005. [7] L. Yong, M.J Lee, T.N. Saadawi. A Bluetooth scatternet-route structure for multi-hop adhoc networks. Selected Areas in Communications. IEEE Journal, Vol.21, pages 229-239, Issue: 2, Feb. 2003 [8] X. Zhang, G.F. Riley. Bluetooth Simulations for Wireless Sensor Networks using GTNetS. 12th IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Oct. 2004. [9] J. Elson and D. Estrin. Time Synchronization for Wireless Sensor Networks. Int’l. Parallel and Distrib. Processing Symp., Wksp. Parallel and Distrib. Comp. Issues in Wireless Networks and Mobile Comp., San Francisco, CA, Apr. 2001.