Cluster Based Intrusion Detection Technique for Wireless Networks

Download Now
Provided by: Auricle Technologies
Topic: Security
Format: PDF
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although, the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead. In this paper, the authors propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. They propose to use the spatial correlation of Received Signal Strength (RSS) inherited from wireless nodes to detect the spoofing attacks.
Download Now

Find By Topic