Loading...
Please wait, while we are loading the content...
Similar Documents
Identification of Multiple Spoofing Attackers and Localizing Multiple Adversaries in Wireless Networks
| Content Provider | Semantic Scholar |
|---|---|
| Author | Prasanthi, Guvvala Reddy, D. Krishna |
| Copyright Year | 2017 |
| Abstract | IJRAET Abstract— Wireless network are openness in nature and it is straightforward for spoofing attacker to launch wireless spoofing attackers that causes threat for information security and impact performance of a network. In standard security crypto logical authentication is used to verify the nodes that are not desirable as a result of network overhead demand. During this paper I take advantage of special data, that is a property associate with every node, that is very hard to falsify, and it does not depend on cryptography. This property will used for detecting spoofing attacker present within the network, determining the quantity of attacker when multiple adversaries masquerade because the same node identity as that of alternative node and localizing multiple adversaries. Then the matter of determining the quantity of attackers as multiclass detection problem is developed. Cluster-based mechanisms are developed to determine the amount of attackers. Once the training information is available, Support Vector Machines (SVM) technique is used to any improve the accuracy of determining the quantity of attackers. Additionally, integrated detection and localization system is used to localize the locations of multiple attackers. Index Terms --Wireless Network Security, Spoofing Attack, Attack Detection, Localization; |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.ijraet.com/pdf22/13.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |