International Journal of Advances in Science, Engineering and Technology(IJASEAT)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-12,Issue-1  ( Jan, 2024 )
  2. Volume-11,Issue-4  ( Oct, 2023 )
  3. Volume-11,Issue-3  ( Jul, 2023 )
  4. Volume-11,Issue-2  ( Apr, 2023 )
  5. Volume-11,Issue-1  ( Jan, 2023 )
  6. Volume-10,Issue-4  ( Oct, 2022 )
  7. Volume-10,Issue-3  ( Jul, 2022 )
  8. Volume-10,Issue-2  ( Apr, 2022 )
  9. Volume-10,Issue-1  ( Jan, 2022 )
  10. Volume-9,Issue-4  ( Oct, 2021 )

Statistics report
Apr
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
  Journal Paper


Paper Title :
Security Against Spoofing Attack In Wireless Environment

Author :Shiyamala Ramaraj, Suganya Sundaramoorthy, Sharon Sushantha, Maheshwari

Article Citation :Shiyamala Ramaraj ,Suganya Sundaramoorthy ,Sharon Sushantha ,Maheshwari , (2014 ) " Security Against Spoofing Attack In Wireless Environment " , International Journal of Advances in Science, Engineering and Technology(IJASEAT) , pp. 36-40, Volume-2,Issue-2

Abstract : Abstract— SPOOFING ATTACK IN WIRELESS ENVIRONMENT is easy to launch as the IP address can be easily forged. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. Spoofing attack can be detected and localized only for single node. The proposed system use spatial information to detect and localize spoofing attack in multiple nodes. The spatial correlation of received signal strength (RSS) inherited from wireless nodes detects the spoofing attacks. The number of attackers can be determined as multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data is available, Support Vector Machine (SVM) is used to further improve the accuracy of determining the number of attackers. The location of the attacker can also be detected based on the Received Signal Strength. . The proposed methodology will obtain a reliable outcome that could be helpful in identifying and eliminating certain attacks.

Type : Research paper

Published : Volume-2,Issue-2


DOIONLINE NO - IJASEAT-IRAJ-DOIONLINE-620   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 40
| Published on 2014-04-16
   
   
IRAJ Other Journals
IJASEAT updates
Volume-11,Issue-4 (Oct,2023)
The Conference World

JOURNAL SUPPORTED BY