Detection and Prevention of Impersonation Attack in Wireless networks

Download Now
Provided by: International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Topic: Security
Format: PDF
Wireless impersonation attack is easy to launch and cause impact on network performance. Cryptographic method is not enough to avoid impersonation attack. In this paper, the authors have tendency to propose to use special data, a property related to every node these data's are complex to falsify and not dependent on cryptographic because the basis for police investigation of spoofing attacks. Crucial the amount of attackers once multiple adversaries masquerading as a same node identity and localizing multiple adversaries.
Download Now

Find By Topic