Survey of Detection and Localization of Multiple Spoofing Attacks in Wireless Networks

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Security
Format: PDF
Wireless systems are defenseless to spoofing attacks, which takes into consideration numerous different types of attacks on the systems. Despite the fact that the personality of a hub might be confirmed through cryptographic verification, confirmation is not dependably conceivable in light of the fact that it requires key administration and extra infrastructural overhead. A method for both detecting spoofing attacks and spotting the positions of foes performing the attacks is introduced. An attack detector for wireless spoofing that uses K-implies cluster analysis is used.
Download Now

Find By Topic