The International Journal of Professional Engineering Studies (IJPES)
Spoofing attacks effectively damage the networks performance and easy to launch by many tools available in market. The previous security approach to address spoofing attacks is to apply cryptographic authentication. However authentication method requires more infrastructures overhead. Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. In this paper, the authors propose a strategy for both recognizing spoofing assaults and placing the positions of foes performing the assaults.