Detecting and Identifying the Location of Multiple Spoofing Adversaries in Wireless Network
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 5)Publication Date: 2014-05-30
Authors : Prashant.R.R; Mohammed Fayaz;
Page : 1-6
Keywords : Wireless Network; Spoofing Attack; Identity-Based Attack; Message Digest 5; Cluster Euclidean distance method;
Abstract
Wireless networks are vulnerable to identity-based attacks, including spoofing attacks, significantly impact the performance of networks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via cryptographic authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management, coupled with additional infrastructural overhead and more extensive computations. The proposed non cryptographic mechanism which are complementary to authenticate and can detect device spoofing with little or no dependency on cryptographic keys. This generalized Spoofing attack-detection model utilizes MD5 (Message Digest 5) algorithm to generate unique identifier for each wireless nodes and a physical property associated with each node, as the basis for (1) detecting spoofing attacks; (2) finding the number of attackers when multiple adversaries masquerading as a same node identity; and localizing multiple adversaries. Nodes Counter technique is developed to determine the number of attackers. Cluster Euclidean distance method is developed for localization of spoofing attackers.
Other Latest Articles
- A Review: Security Issues in Mobile Ad Hoc Network?
- Clustering Techniques Analysis for Microarray Data?
- Climatic Effects on Food Grain Productivity in India: A Crop Wise Analysis
- Technological Changes in Marine Fishing and Livelihood Threats of Fisher Folk
- Data-Base Creation and Analysis for Rational Planning
Last modified: 2014-05-19 15:55:30