A Local Position of Recognition of Node Duplication Attacks in Wireless Networks

Abstract

IP spoofing-based submerging attacks are a serious and open security problem on the current Internet. The best current anti-spoofing practices have long been implemented in modern routers. However, they are not sufficiently applied due to the lack of deployment incentives although the identity of a node can be verified through cryptographic authentication, predictable security approaches are not always desirable because of their overhead requirements. Propose to use the three-dimensional correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Then communicate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based tools are developed to determine the number of attackers achieves monotonically increasing deployment incentives for all types of spoofing attacks, and the structure design is insubstantial and practical. The prefix compression algorithm advances the up-to-date by generalizing the functionalities and reducing the overhead in both time and space. To determine the Spoofing attacks in turn determine the number of attacker masquerading the node and to localize the adversaries.

Authors and Affiliations

R. Latha MCA M. E

Keywords

Related Articles

Energy-Aware Service and Route Discovery Scheme for AODV using Piggybacking in MANETs (AODV-EASARD)

Mobile ad-hoc network (MANET) is an infrastructure-less multihop network where each node communicates with other nodes directly or indirectly through intermediate nodes. Thus, all nodes in a MANET basically function as h...

Natural User Interface a Tool in Physics Learning

In this paper, the natural user interface technology is understood as that which allows people to use their senses in applications control, thus elucidating how technology works more naturally with the human From the use...

Retrieving the Data from Cloud Using Differential Query Services

Cloud computing refers to the delivery of computing resources over the Internet. In a cost efficient cloud environment, a user will experience a degree of delay while retrieving information from the cloud. In such an env...

A Review on Nanomaterial: Chitosan

Nanotechnology is gaining importance rapidly as a most powerful technology. Its immense potential promises the possibility of significant changes in near term future, once the most essential machines -called the Universa...

Epidemiology and Tropical Diseases

Researchers like Dr. Robert Koch, Louis Pasteur, Carlos Chagas, Neisser, Dr. Ronald Ross, David Bruce, Paul Ehrlich, G.H.A Hansen and other different researchers in the science of medicine gave a good contribution in the...

Download PDF file
  • EP ID EP243427
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

R. Latha MCA M. E (2016). A Local Position of Recognition of Node Duplication Attacks in Wireless Networks. International journal of Emerging Trends in Science and Technology, 3(3), 3627-3633. https://europub.co.uk/articles/-A-243427