Detection and Localization of IDS Based Spoofing Attackers in Wireless Sensor Network

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
Wireless spoofing attacks are easy to launch, it plays a significant role in the performance of wireless sensor networks. Although, the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. The challenging tasks in wireless sensor network are identification of spoofing attackers, determination of number of attackers, localization of multiple adversaries and eliminating them. The clustering approach is used to detect the spoofing attackers and localize them. This approach fails to predict the attackers accurately.
Download Now

Find By Topic