International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Wireless impersonation attack is easy to launch and cause impact on network performance. Cryptographic method is not enough to avoid impersonation attack. In this paper, the authors have tendency to propose to use special data, a property related to every node these data's are complex to falsify and not dependent on cryptographic because the basis for police investigation of spoofing attacks. Crucial the amount of attackers once multiple adversaries masquerading as a same node identity and localizing multiple adversaries.