Journal of Theoretical and Applied Information Technology
Wireless spoofing attacks are easy to launch in wireless network due to openness of wireless network. Although the identity of a node can be detected through cryptographic authentication, conservative security approaches are not always possible because of their overhead requirements. Source sends a data to the destination; data is forwarded to the intermediate nodes in between source and destination, with respect to Received Signal Strength (RSS). In this paper, to detect the identity based attacks and multiple adversaries as well as localizing the adversaries.