International Journal of Industrial Electronics and Electrical Engineering (IJIEEE)
Wi-Fi indicator systems are vulnerable to the node replicated, and several distribute methods have been suggested to identify this attack. However, two novel nodes replicated discovering methods with different tradeoffs on system conditions and efficiency. The first one is depending on an allocated Distributed Hash Table (DHT), by which a fully decentralized, key based caching and verifying system is designed to capture duplicated nodes effectively. The method efficiency on efficient storage spending and great security level is apparently subtracted through a possibility model, and the causing equations, with necessary improvements for real application, are reinforced by the models.