TRACKING AND PREVENTING THE MULTIPLE SPOOFING ATTACKS IN WIRELESS NETWORKS
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 11)Publication Date: 2015-11-30
Authors : Dharmaji V. Manjrekar; Nita K. Dongare; Radhika R. Chavan;
Page : 268-273
Keywords : Wireless Spoofing Attacks; MAC address allocation; MD5 Hashing Technique; EPAM approach; Cluster-based Mechanisms.;
Abstract
Wireless Networks are more vulnerable to spoofing attacks which can be launched easily and considered as one of the most challenging, but these attacks have huge impact on the network performance. In this paper, we aim to propose a theory based on a physical property that cannot be altered, and does not depend on any of cryptographic approach, as medium for 1) Detection of spoofing attacks occurred in the network, 2) Determining the number of attackers present in the network 3) Localizing all adversaries and elimination them from the network and 4) Preventing these attackers from rejoining the network. We intend to use the spatial correlation of RSS readings that are acquired from wireless nodes to track down the attacker. Further, Cluster based mechanisms can be helpful in calculating the number of adversaries in the network. Distance-based Detection and Localization (DDL) will assist to accurately locate the attackers in the network while MAC address allocation scheme using MD5 hashing technique is applied to prevent the attacks. Hence, we can recover the network performance with high accuracy rate.
Other Latest Articles
- IMPACT OF BRAND LOYALTY ON RETAIL BUYING BEHAVIOUR IN HYDERABAD
- COMPARATIVE ANALYSIS OF 64-BIT DIFFERENT SRAM CELL USING 180NM TECHNOLOGY
- TATA KELOLA TEKNOLOGI INFORMASI (IT GOVERNANCE)
- PENGUKURAN RISIKO ASET TEKNOLOGI INFORMASI BERBASIS PBI PADA SEKTOR PERBANKAN DI INDONESIA
- KNOWLEDGE MANAGEMENT SYSTEM DESIGN AT HUMAN RESOURCES DIVISION
Last modified: 2015-11-17 12:28:14