Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network

Abstract

Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a variety of attacks with little effort .These attacks affect the network performance and leads to easy access of secured data .The main aim of this project is to detect and prevent unauthorized access of wireless data from spoofed using Zigbee technology. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, these approaches are not always desirable because of their overhead requirements .In this project, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity, and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.

Authors and Affiliations

Cherukuri Srikanth, K. Vadivukkarasi

Keywords

Related Articles

A Comparative Analysis of CNN, RCNN & Faster RCNN Object Detection Algorithm for CAPTCHA Breaking

CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) systems serve as a crucial defense mechanism against automated attacks by distinguishing between human users and bots. However, advance...

Secure Aggregation of Data in Connection-Less Networks

Reliable Minimal Energy Cost Routing (RMECR) and Reliable Minimum Energy Routing are two ingenious dynamism- conscious routing algorithms for wireless ad hoc networks (RMER). Ad hoc network conditions for dynamism effect...

Wind-Photovoltaic Combined Generation with Grid Connection Using Back-to-Back Voltage Source Converters

Here, we introduce a brand - new topology, but easy and efficient, for a grid-linked windphotovoltaic (PV) cogeneration system. A permanent magnet synchronous generator-primarily based totally full - scale wind turbine i...

Polymer Modified Flexible Pavement and Characterization

Rutting is an essential explanation of untimely disintegration of black-top roadway asphalts. Asphalts constructed with polymer and different modifiers are showing further developed execution. The virgin black-top and ch...

Optimal Energy-Efficient Predictive Controllers for Automotive Air Conditioning Systems

This work provides robust model predictive controllers for a vehicle climate control (A/C-R) system featuring a three-speed, constantly variable compressor that improves temperate stability while lowering energy consumpt...

Download PDF file
  • EP ID EP748834
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

Cherukuri Srikanth, K. Vadivukkarasi (2015). Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network. International Journal of Innovative Research in Computer Science and Technology, 3(2), -. https://europub.co.uk/articles/-A-748834