Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network

Abstract

Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a variety of attacks with little effort .These attacks affect the network performance and leads to easy access of secured data .The main aim of this project is to detect and prevent unauthorized access of wireless data from spoofed using Zigbee technology. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, these approaches are not always desirable because of their overhead requirements .In this project, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity, and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.

Authors and Affiliations

Cherukuri Srikanth, K. Vadivukkarasi

Keywords

Related Articles

Revolutionizing Education with Geekbits: A Comprehensive Study

In an era where digital technology pervades every aspect of our lives, education too has undergone a profound transformation. Geekbits emerges as a pioneering solution, aiming to revolutionize the learning experience for...

Applications of Deep Learning and Machine Learning

In contemporary computer sciences, machine learning is one of the areas. A lot of research has been carried out to make machines intelligent. Learning is an important feature of computers as well as normal human behavior...

A Systematic Review of Challenges in Fog Computing

The number of Internet of Things (IoT) applications is rapidly increasing. Current cloud-centric IoT designs, on the other hand, are unable to meet the mobility and dormancy necessities of duration precarious IoT practic...

EV Charging Using DC Storage and Sustainable Energy

As countries and automakers focus on initiatives such as "keeping green," climate action, and so on, the present worldwide inclination favoring electric vehicles is growing. An inherent aspect of this is the design of el...

AI Transforming Data Networking and Cybersecurity through Advanced Innovations

The rapid expansion of data networking infrastructure has necessitated advancements in cybersecurity to mitigate increasingly sophisticated cyber threats. As the digital landscape evolves, networks are handling unprecede...

Download PDF file
  • EP ID EP748834
  • DOI -
  • Views 52
  • Downloads 0

How To Cite

Cherukuri Srikanth, K. Vadivukkarasi (2015). Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network. International Journal of Innovative Research in Computer Science and Technology, 3(2), -. https://europub.co.uk/articles/-A-748834