Identification of Multiple Spoofing Attackers in Wireless Network

Identification of spoofing attacks can sight each, the presence of attacks further as confirm the amount of adversaries, spoofing an equivalent node identity, in order that the authors will localize any range of attackers and eliminate them. Deciding the amount of adversaries may be a significantly difficult drawback. To validate their approach, they tend to conducted experiments found that their detection mechanisms square measure extremely effective in each police investigation the presence of attacks with detection rates over ninety eight p.c and deciding the amount of adversaries, achieving over ninety p.c hit rates and exactitude at the same time.

Provided by: Creative Commons Topic: Security Date Added: Dec 2014 Format: PDF

Find By Topic