A Local Position of Recognition of Node Duplication Attacks in Wireless Networks

Abstract

IP spoofing-based submerging attacks are a serious and open security problem on the current Internet. The best current anti-spoofing practices have long been implemented in modern routers. However, they are not sufficiently applied due to the lack of deployment incentives although the identity of a node can be verified through cryptographic authentication, predictable security approaches are not always desirable because of their overhead requirements. Propose to use the three-dimensional correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Then communicate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based tools are developed to determine the number of attackers achieves monotonically increasing deployment incentives for all types of spoofing attacks, and the structure design is insubstantial and practical. The prefix compression algorithm advances the up-to-date by generalizing the functionalities and reducing the overhead in both time and space. To determine the Spoofing attacks in turn determine the number of attacker masquerading the node and to localize the adversaries.

Authors and Affiliations

R. Latha MCA M. E

Keywords

Related Articles

Nanotechnology in Construction & Civil Engineering

This paper introduces relevant nanotechnology developments to convey the new and inspire creativity in civil engineering. The recent researches on nano materials and nanotechnologies have highlighted the potential use of...

Winding Fault Detection in Power Transformer by SFRA with DOBLE M5100

The Doble M5100 is a robust and field proven instrument for detection of hidden fault in Power Transformer uses technique called Sweep Frequency Response Analysis (SFRA). SFRA is a tool that can give an indication of cor...

Refining the Noisy Candidates in Learning Data for Improving Classification Performance

The data mining is a technique are used to learn a pattern and identify the pattern among a huge amount of data using computer based algorithms or programs. In this technique the two main technique of learning is found f...

Wind Power Generation System Using Railway – A Prototype Model

Since the conventional power generation involved natural resource which are depleting day by day, the use of non-conventional source can be a better alternative in generation of electricity. Wind power is a major source...

Trust based Opportunistic Routing Admission Control in Wireless Ad Hoc Networks

For providing QoS in wireless ad hoc networks is difficult task because the network is decentralised network. The multi-hop nature of the network affects QoS in wireless networks. In routing scheme, if one node at the op...

Download PDF file
  • EP ID EP243427
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

R. Latha MCA M. E (2016). A Local Position of Recognition of Node Duplication Attacks in Wireless Networks. International journal of Emerging Trends in Science and Technology, 3(3), 3627-3633. https://europub.co.uk/articles/-A-243427