Prevention of Spoofing Attacks in Wireless Sensor Networks

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
The Wireless Sensor Networks (WSNs) are vulnerable to spoofing and spoofing related attacks. Even though various methods have been imposed for detecting and locating the attackers but it does not focuses to prevent the node from the attackers. In this paper, the authors propose to show how the spoofing and spoofing related attacks like the flooding attack ad the man in the middle occur, where the flooding attacks send empty packets to disrupt the data send from the node and the man in the middle attack by redirect the packets to the different path.
Download Now

Find By Topic