International Journal of Computer Science and Mobile Computing (IJCSMC)
Wireless systems are defenseless to spoofing attacks, which takes into consideration numerous different types of attacks on the systems. Despite the fact that the personality of a hub might be confirmed through cryptographic verification, confirmation is not dependably conceivable in light of the fact that it requires key administration and extra infrastructural overhead. A method for both detecting spoofing attacks and spotting the positions of foes performing the attacks is introduced. An attack detector for wireless spoofing that uses K-implies cluster analysis is used.