A Study of Various Spoofing Attacks and Attackers in Wireless Networks

Download Now
Provided by: Iosrjournals
Topic: Networking
Format: PDF
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, the authors propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attack; determining the number of attackers when multiple adversaries masquerading as the same node identity; and localizing multiple adversaries.
Download Now

Find By Topic