Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks
Title | Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Vijayakumar, R., Selvakumar, K., Kulothungan, K., Kannan, A. |
Conference Name | Communications and Signal Processing (ICCSP), 2014 International Conference on |
Date Published | April |
Keywords | Accuracy, Attacks Detection and Prevention, Broadcasting, cryptography, dynamic MAC address allocation, Electronic mail, enhanced partitioning around medoid, EPAM clustering, Hardware, MAC Spoofing attacks, MD5 hashing, Monitoring, radio networks, received signal strength, spoofing attack detection, telecommunication security, Wireless communication, Wireless Network Security, wireless networks |
Abstract | In wireless networks, spoofing attack is one of the most common and challenging attacks. Due to these attacks the overall network performance would be degraded. In this paper, a medoid based clustering approach has been proposed to detect a multiple spoofing attacks in wireless networks. In addition, a Enhanced Partitioning Around Medoid (EPAM) with average silhouette has been integrated with the clustering mechanism to detect a multiple spoofing attacks with a higher accuracy rate. Based on the proposed method, the received signal strength based clustering approach has been adopted for medoid clustering for detection of attacks. In order to prevent the multiple spoofing attacks, dynamic MAC address allocation scheme using MD5 hashing technique is implemented. The experimental results shows, the proposed method can detect spoofing attacks with high accuracy rate and prevent the attacks. Thus the overall network performance is improved with high accuracy rate. |
DOI | 10.1109/ICCSP.2014.6950125 |
Citation Key | 6950125 |
- MAC Spoofing attacks
- wireless networks
- Wireless Network Security
- Wireless communication
- telecommunication security
- spoofing attack detection
- received signal strength
- radio networks
- Monitoring
- MD5 hashing
- Accuracy
- Hardware
- EPAM clustering
- enhanced partitioning around medoid
- Electronic mail
- dynamic MAC address allocation
- Cryptography
- Broadcasting
- Attacks Detection and Prevention