ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 11)

Publication Date:

Authors : ; ; ;

Page : 268-273

Keywords : Wireless Spoofing Attacks; MAC address allocation; MD5 Hashing Technique; EPAM approach; Cluster-based Mechanisms.;

Source : Downloadexternal Find it from : Google Scholarexternal


Wireless Networks are more vulnerable to spoofing attacks which can be launched easily and considered as one of the most challenging, but these attacks have huge impact on the network performance. In this paper, we aim to propose a theory based on a physical property that cannot be altered, and does not depend on any of cryptographic approach, as medium for 1) Detection of spoofing attacks occurred in the network, 2) Determining the number of attackers present in the network 3) Localizing all adversaries and elimination them from the network and 4) Preventing these attackers from rejoining the network. We intend to use the spatial correlation of RSS readings that are acquired from wireless nodes to track down the attacker. Further, Cluster based mechanisms can be helpful in calculating the number of adversaries in the network. Distance-based Detection and Localization (DDL) will assist to accurately locate the attackers in the network while MAC address allocation scheme using MD5 hashing technique is applied to prevent the attacks. Hence, we can recover the network performance with high accuracy rate.

Last modified: 2015-11-17 12:28:14