Survey on Security Management of Multiple Spoofing Attackers in Wireless Networks

Main Article Content

Mr. Rajpure Amol Subhash, Prof. Bere Sachin Sukhadeo

Abstract

Wireless spoofing attacks are simple to introduce and can importantly impact the performance of networks. In this paper, we propose to use spatial information a physical property related to every node, complex to mispresent and self reliant on cryptography, as the initializing for detecting spoofing attacks determining the number of attackers when multiple opponent masquerading as the same node identity and localizing multiple adversaries We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. For determining the number of attackers we are using cluster based mechanism. To localize the positions of multiple attackers, we have developed an integrated detection and localization system. The generated localization results with a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries. As the wireless networks are easily susceptible for various types of spoofing attacks, basically this paper focuses on Identity-based spoofing attacks and the enhanced and efficient techniques to secure from such attacks.

Article Details

How to Cite
, M. R. A. . S. P. B. S. S. (2014). Survey on Security Management of Multiple Spoofing Attackers in Wireless Networks. International Journal on Recent and Innovation Trends in Computing and Communication, 2(11), 3514–3516. https://doi.org/10.17762/ijritcc.v2i11.3499
Section
Articles