Spatial Correlation of RSS for Detecting and Finding Malicious Adversaries in Wireless Networks

Download Now
Provided by: IJAERT
Topic: Security
Format: PDF
Unlike wired networks, wireless networks are resource constrained and thus vulnerable to different kinds of attacks. On such attack is known as spoofing attack. The traditional security approaches cannot solve the problem of spoofing attacks in wireless networks. They generally use cryptographic solutions for securing communications over networks. They are not directly fit into wireless environment as they cause lot of overhead. Recently, the researchers proposed a solution that that does not use cryptography. Moreover, the solution finds spoofing attacks and localizes the adversaries.
Download Now

Find By Topic