Detection and Localization of Multiple Spoofing Attackers Using Cluster Analysis in Wireless Network

Download Now
Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Data Management
Format: PDF
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the authentication is not always possible because it requires key management and additional infrastructural overhead. In this paper, the authors describe method on detection and localization of multiple spoofing attackers in wireless networks. They have spatial information a physical property of a node which have its no dependence on cryptography and hard to falsify for detecting spoofing attacks; determining the number of attackers when multiple adversaries masquerading as a same node identity; and localizing multiple adversaries.
Download Now

Find By Topic