Identifying and Locating Multiple Spoofing Attackers Using Clustering in Wireless Network

Download Now
Provided by: Science Publishing Group
Topic: Security
Format: PDF
Wireless networks are vulnerable to identity-based attacks, including spoofing attacks, significantly impact the performance of networks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via cryptographic authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management, coupled with additional infrastructural overhead and more extensive computations. The proposed non cryptographic mechanism which are complementary to authenticate and can detect device spoofing with little or no dependency on cryptographic keys.
Download Now

Find By Topic