Provided by: Creative Commons
Date Added: Nov 2014
In today, networks are becoming dangerous due to IP spoofing attacks. It is specially affecting in the wireless networks i.e. both in the ad hoc and sensor networks. There are various solutions available like cryptographic algorithms that can identify the transmitter but it requires complex key computations. In this paper, the authors argue that it is possible to provide supporting strategies to traditional authentication that can identify device spoofing without any cryptographic algorithm. They propose the forge resistant relationship in the malicious attacks.