Detection and Localization Multiple spoofing Attackers in wireless in Networks

Download Now
Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Security
Format: PDF
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. This paper, propose to use spatial information, a physical property associated with each node, hard to falsify and not reliant on cryptography, as the basis for detecting spoofing attacks; determining the number of attackers when multiple adversaries masquerading as the same node identity; and localizing multiple adversaries.
Download Now

Find By Topic