Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks

  • Prof.Dr.C.A.Dhote P
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

In wireless networks, Spoofing attacks are easy to launch but it degrades the performance of the networks. To identity an attacker node, it can be verified through cryptographic authentication, authentication is always not possible because it requires key management and additional infrastructural overhead. The proposed approach is used for 1) Detecting spoofing attacks 2) Determining the number of attackers when multiple adversaries masquerading the same node identity and 3) Localizing multiple adversaries. The proposed system uses spatial correlation of received signal strength (RSS) to detect the spoofing attacks. Cluster-based mechanisms are introduced to determine the number of attackers. In this paper, K-Nearest-Neighbor classifier (KNN) is proposed to improve the performance of determining the number of attacks. Finally, An Integrated Detection and Localization system is used to localize the positions of multiple attackers. KEYWORDS:

Cite

CITATION STYLE

APA

Prof.Dr.C.A.Dhote, P. D. S. (2015). Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks. International Journal of Innovative Research in Computer and Communication Engineering, 03(05), 3882–3888. https://doi.org/10.15680/ijircce.2015.0305021

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free