Modeling Security With Localization of Multiple Spoofing Attackers in Wireless Network

Provided by: The International Journal Of Engineering And Science (IJES)
Topic: Security
Format: PDF
As the current age is the age of computers, the wireless spoofing attacks that can be easily launched and these attacks also degrade the performance of the system or networks. The cryptography can be used to maintain security in such networks but such conventional approach can't be desirable due to its overhead requirements. Hence in this paper, the authors propose to use RSS (Received Signal Strength) i.e. the spatial information which is the physical property of each node. This physical property is not reliant on any cryptographic scheme and also it is hard to falsify n hence essential to use.

Find By Topic