Light-weight detection of spoofing attacks in wireless networks

Qing Li, Wade Trappe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Abstract

Many wireless networks are susceptible to spoofing attacks, whereby an adversary imitates the network identifiers of legitimate devices. Conventionally, assuring the identity of the communicator and thereby detecting an adversarial presence is performed via device authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management and more extensive computations. In this paper we argue that it is desirable to have a functionality complementary to traditional cryptographic authentication that can detect device spoofing with little or no dependency on cryptographic material. To accomplish this, we introduce the notion of forge-resistant relationships associated with transmitted packets, as well as forge-resistant consistency checks, which allow other network entities to detect anomalous activity. We then provide two practical examples of forge-resistant relationships for detecting anomalous network activity: we explore the use of a supplemental identifier field that evolves in time according to a reverse one-way function chain, and the use of signal strength readings for source discrimination. We validate the usefulness of these methods for anomalous "spoofed" traffic scenarios involving multiple sources sharing the same MAC address through experiments conducted on the ORBIT wireless testbed.

Original languageEnglish (US)
Title of host publication2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, MASS
PublisherIEEE Computer Society
Pages845-851
Number of pages7
ISBN (Print)1424405076, 9781424405077
DOIs
StatePublished - 2006
Event2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, MASS - Vancouver, BC, Canada
Duration: Oct 9 2006Oct 12 2006

Publication series

Name2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS
Volume1

Other

Other2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems, MASS
CountryCanada
CityVancouver, BC
Period10/9/0610/12/06

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint Dive into the research topics of 'Light-weight detection of spoofing attacks in wireless networks'. Together they form a unique fingerprint.

Cite this