Science Publishing Group
Wireless networks are vulnerable to identity-based attacks, including spoofing attacks, significantly impact the performance of networks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via cryptographic authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management, coupled with additional infrastructural overhead and more extensive computations. The proposed non cryptographic mechanism which are complementary to authenticate and can detect device spoofing with little or no dependency on cryptographic keys.