ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Detecting and Identifying the Location of Multiple Spoofing Adversaries in Wireless Network

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 5)

Publication Date:

Authors : ; ;

Page : 1-6

Keywords : Wireless Network; Spoofing Attack; Identity-Based Attack; Message Digest 5; Cluster Euclidean distance method;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless networks are vulnerable to identity-based attacks, including spoofing attacks, significantly impact the performance of networks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via cryptographic authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management, coupled with additional infrastructural overhead and more extensive computations. The proposed non cryptographic mechanism which are complementary to authenticate and can detect device spoofing with little or no dependency on cryptographic keys. This generalized Spoofing attack-detection model utilizes MD5 (Message Digest 5) algorithm to generate unique identifier for each wireless nodes and a physical property associated with each node, as the basis for (1) detecting spoofing attacks; (2) finding the number of attackers when multiple adversaries masquerading as a same node identity; and localizing multiple adversaries. Nodes Counter technique is developed to determine the number of attackers. Cluster Euclidean distance method is developed for localization of spoofing attackers.

Last modified: 2014-05-19 15:55:30