Secure Data Transmission against Pilot Spoofing using Cookie Management and MAC Address Validation

IJCSEC Front Page

Abstract:
The pilot spoofing attack is one reasonably active eavesdropping activities conducted by a malicious user throughout the channel training phase. By transmission the identical pilot (training) signals as those of the legal users such an attack can able to manipulating the channel estimation outcome, which may result in a huge channel rate for the adversary but a small channel rate for the legitimate receiver. The proposed system has an intention for detecting the pilot spoofing attack and minimizing its damages, a tendency to style a two way training based scheme is introduced. An effective detector exploits the interfering element designed by the adversary, followed by a beam forming assisted data transmission. In addition to the solid detection performance, this scheme is also able to get the estimations of each legitimate channel. The cookies are analyzed and MAC address is generated. The encryption is achieved by using SHA-1 algorithm. A hash price is generated to the hacker using MD5 algorithm.

Keywords: spoofing attack, SHA-1, MD5, pilot spoofing, cookies

References:

  1. Shyam Jadhav, Yogesh Katke, Vaibhav Joshi, Sagar Thore , “ Detection and Localization of Multiple Spoofing Attackers”, in IJARCSSE, Vol. 4, Issue 10, October 2014
  2. T C Deepthi, Jenelin S S, “Detection and Localization of Pilot Spoofing Attacks in Wireless Communication Systems”, in IJAREEIE, Vol. 5, Special Issue 2, March 2016.
  3. Yong Zeng, Rui Zhang,“Active eavesdropping via spoofing relay attack”, in IEEE, May 2016.
  4. Keerthy K Murali , Abhisha Devi C M, “A Study on Pilot Spoofing Attack Detection”, in IJIRCCE, Vol. 4, Issue 7, July 2016.
  5. Senthil Kumar M, Suganya S, “A Review on Pilot Spoofing Attacks in Wireless Networks”, in Vol. 4, Issue 9, September 2016.
  6. W. Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed. Upper Saddle River, NJ, USA: Prentice Hall, 2003.
  7. S. Shafiee and S. Ulukus, “Achievable rates in Gaussian MISO channels with secrecy constraints,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 2466–2470.
  8. A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas—Part II: The MIMOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515–5532, Nov. 2010.
  9. Q. Xiong, Y. Gong, Y.-C. Liang, and K. H. Li, “Achieving secrecy of MISO fading wiretap channels via ja mming and precoding with imperfect channel state information,” IEEE Wireless Commun. Lett., vol. 3, no. 4, pp. 357–360, Aug. 2014.