Identity Based Detection of Spoofing Attackers in Wireless Networks and Practical Solutions

Download Now
Provided by: International Journal of Ethics in Engineering & Management Education (IJEEE)
Topic: Security
Format: PDF
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, the authors propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks; determining the number of attackers when multiple adversaries masquerading as a same node identity; and localizing multiple adversaries.
Download Now

Find By Topic