A Local Position of Recognition of Node Duplication Attacks in Wireless Networks

Abstract

IP spoofing-based submerging attacks are a serious and open security problem on the current Internet. The best current anti-spoofing practices have long been implemented in modern routers. However, they are not sufficiently applied due to the lack of deployment incentives although the identity of a node can be verified through cryptographic authentication, predictable security approaches are not always desirable because of their overhead requirements. Propose to use the three-dimensional correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Then communicate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based tools are developed to determine the number of attackers achieves monotonically increasing deployment incentives for all types of spoofing attacks, and the structure design is insubstantial and practical. The prefix compression algorithm advances the up-to-date by generalizing the functionalities and reducing the overhead in both time and space. To determine the Spoofing attacks in turn determine the number of attacker masquerading the node and to localize the adversaries.

Authors and Affiliations

R. Latha MCA M. E

Keywords

Related Articles

Hacking in Social Media and Some Guidelines to Avoid It

Hacking in social media means to get private information of user without his permission. In this work, an attempt has been made to show you that what mistakes are generally done by users. So that hacker takes advantages...

Prevalence of Intestinal Parasitic Infections and Associated Risk factors among School children in Adigrat town, Northern Ethiopia

Intestinal parasitic infections are among the major public health and socioeconomic problems in developing countries. A cross sectional parasitological examination was conducted on 309 school children to assess the preva...

Impact of Static & Dynamic load at the base of High Speed Turbo Generator Using Three Dimensional Finite Element Stresses

This paper is meant to disseminate the state-of-the-art works on the importance of vertical ground motion and horizontal ground movement under high speed generator in the power sector. The author particularly likes to ra...

Some Fixed point theorems in Complex Valued Metric Space using Weak Compatible Mappings

The aim of the present paper is to establish fixed point theorems for self mappings under weakly compatibility in Complex valued metric space. Subject Classification: 47H10,54H25

A Review on Nanomaterial: Chitosan

Nanotechnology is gaining importance rapidly as a most powerful technology. Its immense potential promises the possibility of significant changes in near term future, once the most essential machines -called the Universa...

Download PDF file
  • EP ID EP243427
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

R. Latha MCA M. E (2016). A Local Position of Recognition of Node Duplication Attacks in Wireless Networks. International journal of Emerging Trends in Science and Technology, 3(3), 3627-3633. https://europub.co.uk/articles/-A-243427