Book Details

Detecting Spoofing Attack in Cluster based Wireless System

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

Wireless networks square measure liable to uniqueness-based attacks, like spoofing attacks. The wireless spoofing attacks square measure simple to take-off and may considerably influence the performance of networks. Predictably, scientific discipline authentication helps in making certain identity of somebody and detects the unauthorized user. Awkwardly, full scale authentication isn't fascinating as if needs coupled further infrastructure overhead, key management and additional wide-ranging computations. The non-cryptographic mechanism won’t to attest and may discover device spoofing or no dependency on scientific discipline keys. The MD5 (Message Digest 5) algorithmic program are utilized by generalized Spoofing attack detection to come up with distinctive symbol for every wireless nodes. During this paper, we have a tendency to propose to use property related to every nodes, laborious to falsify, and not dependent on cryptography, because the basis for 1) spoofing attack detection; 2) range of attackers square measure determined once multiple adversaries masquerading because the same node identity; and 3) multiple adversaries localization. To work out the amount of attackers, cluster-based mechanisms has introduced. To enhance the accuracy of determinant the amount of attackers, Support Vector Machines (SVM) has introduced

References

[1] P.RameshBabu et al.: A Comprehensive Analysis of spoofing (International Journal of Advanced Computer Science and Application, 2010)

[2] IyadAldasouqi et al.: Detecting and Localizing Wireless Network Attacks Techniques (IJCSS, 2010)

[3] P.InfantKingsly et al.: Smart Way for Secured Communication in Mobile Ad-hoc Networks (IJCII, 2012)

Keywords

Image
  • Format Volume 2, Issue 1, No 2, 2014.
  • Copyright All Rights Reserved ©2014
  • Year of Publication 2014
  • Author P.Saranya, B.UshaRanjini
  • Reference IJCS-037
  • Page No 204-208

Copyright 2024 SK Research Group of Companies. All Rights Reserved.