A Local Position of Recognition of Node Duplication Attacks in Wireless Networks

Abstract

IP spoofing-based submerging attacks are a serious and open security problem on the current Internet. The best current anti-spoofing practices have long been implemented in modern routers. However, they are not sufficiently applied due to the lack of deployment incentives although the identity of a node can be verified through cryptographic authentication, predictable security approaches are not always desirable because of their overhead requirements. Propose to use the three-dimensional correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Then communicate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based tools are developed to determine the number of attackers achieves monotonically increasing deployment incentives for all types of spoofing attacks, and the structure design is insubstantial and practical. The prefix compression algorithm advances the up-to-date by generalizing the functionalities and reducing the overhead in both time and space. To determine the Spoofing attacks in turn determine the number of attacker masquerading the node and to localize the adversaries.

Authors and Affiliations

R. Latha MCA M. E

Keywords

Related Articles

A study of production inventory model of deteriorating items in an imperfect production process

The paper describes an EMQ (Economic Manufacturing Quantity ) model for a deteriorating item considering time-dependent demand. The deterioration rate is a constant fraction of the on hand inventory and we have considere...

Autonomous Data Diffusion communal Wireless Sensor Network with Intense Randomized Multipath Methods

Well-being threats encountered in a wi-fi sensor community, so more than a few safety offering algorithms are to be had. In this paper we have concentrated on routing mechanisms that avoid black holes shaped via those as...

A Review Study on A-TIG Welding of 316(L) Austenitic Stainless Steel

Austenitic stainless steels are widely used in the application of aircraft engine parts, heat exchangers, furnace parts etc. It contains both chromium and nickel. Nickel and chromium aids stability of austenite over wide...

Chemical Investigation of Saturated Aliphatic Ester from the Tuber of Dioscorea Bulbifera

Dioscorea bulbifera (family- Discoreaceae) is found commonly in India. Recent Pharmacological finding indicate that its tubers possess significant activities, rejuvenating and tonic. Phytochemical investigations of tuber...

ISO Implementation: A Case Study for an Indian Automobile Industry

Every manufacturing organization is concerned with the quality of its products, while it is very important that quality requirements be satisfied and production schedules be met. It is equally important that the finished...

Download PDF file
  • EP ID EP243427
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

R. Latha MCA M. E (2016). A Local Position of Recognition of Node Duplication Attacks in Wireless Networks. International journal of Emerging Trends in Science and Technology, 3(3), 3627-3633. https://europub.co.uk/articles/-A-243427