Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Download Now
Provided by: International Journal of Innovative Science Engineering and Technology (IJISET)
Topic: Security
Format: PDF
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. Here, the authors propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting the spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity and localizing multiple adversaries.
Download Now

Find By Topic