A Local Position of Recognition of Node Duplication Attacks in Wireless Networks
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 3
Abstract
IP spoofing-based submerging attacks are a serious and open security problem on the current Internet. The best current anti-spoofing practices have long been implemented in modern routers. However, they are not sufficiently applied due to the lack of deployment incentives although the identity of a node can be verified through cryptographic authentication, predictable security approaches are not always desirable because of their overhead requirements. Propose to use the three-dimensional correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Then communicate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based tools are developed to determine the number of attackers achieves monotonically increasing deployment incentives for all types of spoofing attacks, and the structure design is insubstantial and practical. The prefix compression algorithm advances the up-to-date by generalizing the functionalities and reducing the overhead in both time and space. To determine the Spoofing attacks in turn determine the number of attacker masquerading the node and to localize the adversaries.
Authors and Affiliations
R. Latha MCA M. E
Community Radio a Social Tool for Women Enpowerment in Namakkal District
This paper presents an insight into a proposal that intends to empowerment of women. It reflects on direct and indirect impacts of the initiative that targeted hundreds of women in Paramathi Velur, Namakkal District. The...
Students’ Knowledge of HIV/AIDS and their Attitude towards Sexual Behaviour- A Comparative study of Form 1 and Form 4 secondary school students in Coast Region, Kenya
National AIDS Control Council and the Ministry of Education Science and Technology in Kenya developed the 2004 Education Sector Policy on HIV and AIDS. The policy was intended to reduce HIV/AIDS infection and stigmatisat...
Investigation of the effect of Training Data on the Performance of Support Vector Machine in Classification of BrainMR Images
In recent years, a wide research is being carried out on brain imaging which involves computer aided detection of abnormalities in brain. Out of many diagnostic imaging techniques for the early detection of any abnormal...
Assuring Data Integrity in Cloud Using Regenerating Codes
The cloud computing is the emerging technology growing rapidly with its services. Cloud storage is one of the many services it is rendering. This cloud storage not only allows the clients to store their huge volume of pr...
Stature from Human Sternum in Females
An essential aspect of medico-legal proceedings is stature estimation. Securing the regression formula for calculation of stature of adult females by assessing the length of manubrium and meso-sternum is the objective of...