Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network

Abstract

Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a variety of attacks with little effort .These attacks affect the network performance and leads to easy access of secured data .The main aim of this project is to detect and prevent unauthorized access of wireless data from spoofed using Zigbee technology. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, these approaches are not always desirable because of their overhead requirements .In this project, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity, and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.

Authors and Affiliations

Cherukuri Srikanth, K. Vadivukkarasi

Keywords

Related Articles

The Major Effect in the Privacy Select to Run Client Server

Because server client systems frequently store data and process data both on the client and on the server, this sort of system contingency planning should take into consideration potential system failures on the server o...

Face Recognition Based on Attendance Management System

Attendance is very important task for an organization like school, colleges, companies etc. Taking of attendance manually is very time consuming. It takes up to 5 to 20 minutes and it depends upon the number of students...

Analysing Auto ML Model for Credit Card Fraud Detection

Fraud Detection is a major concern these days because of digitalization. We are totally dependent on online transactions these days for even very small needs. There is no doubt that online transactions have made our life...

Feature Extraction and Processing Analysis in Speech Recognition

The difficulties with automated identification and synthesis of various speech patterns have become significant research issues in recent years. Stress-induced speech characteristics were compared to normal speech in a f...

Power Quality Improvement in Distributed Generation using DSTATCOM and Photovoltaic Power Controller

Conventional energy sources like coal, nuclear energy sources, water, and other fossil fuels are getting depleted day by day. The availability of these resources is limited and would be exhausted one day. Therefore peopl...

Download PDF file
  • EP ID EP748834
  • DOI -
  • Views 72
  • Downloads 0

How To Cite

Cherukuri Srikanth, K. Vadivukkarasi (2015). Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network. International Journal of Innovative Research in Computer Science and Technology, 3(2), -. https://europub.co.uk/articles/-A-748834