Counter Measures to Combat Misuses of MAC Address Spoofing Techniques

Download Now
Provided by: The International Journal of Advanced Networking and Applications
Topic: Mobility
Format: PDF
In a computer network several communicating devices are connected to a common shared communication medium. A network interfacing card or a wireless network card is typically used to connect computers on a network. This gives rise to the need of unique identification mechanism to be followed for each of the connected devices. Media Access Control (MAC) addressing is used to properly identify communicating devices. The term MAC spoofing refers to a situation when somebody changes the MAC address of his computer or the network communicating device to impersonate someone else based upon this MAC address identification.
Download Now

Find By Topic