ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)

Publication Date:

Authors : ; ;

Page : 230-239

Keywords : MANET; Spoofing; Security; Zone based; Mobile Replica Node;

Source : Downloadexternal Find it from : Google Scholarexternal


Wireless networks are exposed to many attacks which of one is spoofing attack. The networks performance will be affected more when the attackers are present. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. K means clustering is used to determine the number of attackers. In this paper we proposed to use Enhanced Sequential Probability Ratio test (ESPRT) technique. This is the fast and effective technique to detect the mobile replica nodes. The network is divided into set of zones, and then trust level is established for each zone to detect untrustworthy zones. The entire zone is considered as untrustworthy if trust level goes below trust threshold. The base station will revoke the zone if it considers the zone as untrustworthy. The main benefit of this zone-based detection approach lies in achieving fast node compromise detection and revocation while saving the large amount of time and effort.

Last modified: 2014-08-17 19:57:12