Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 2
Abstract
Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a variety of attacks with little effort .These attacks affect the network performance and leads to easy access of secured data .The main aim of this project is to detect and prevent unauthorized access of wireless data from spoofed using Zigbee technology. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, these approaches are not always desirable because of their overhead requirements .In this project, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity, and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.
Authors and Affiliations
Cherukuri Srikanth, K. Vadivukkarasi
Analysis of Bituminous Concrete Mixes Using H.D.P.E & Crumb Rubber as Admixtures
Flexible pavements need more attention in selection of Resources and preparation of mixes now a day’s temperature is the main criteria which affect the mix quality, strength and durability. Rapid changes in temperature n...
Real Time Prevention of Driver Fatigue Using Deep Learning and MediaPipe
This paper describes the development of a system for detecting driver drowsiness whose goal is to alert drivers of their sleepy state to prevent traffic accidents. It is essential that drowsiness detection in a driving e...
Review on Teaching Ethical Hacking
The word hacker generally characterize the practice or performance of investigating & carry out trial with computer networks as computer communications grew more ubiquitous with the emergence of the Internet. However, wh...
CUMULATIVE SUM, CUMULATIVE SCORE AND NONPARAMETRIC CUSUM CONTROL CHARTS FOR DETECTING MEAN/MEDIAN CHANGE
Various control charts are already developed for the problem of detecting any shift in the mean/median of a sequence of observations from a specified control value taken from some process. Some of them for detecting smal...
Image enhancement in wavelet domain using histogram equalization and median filters
Image enhancement is one of the challenging but crucial methods that is employed in image processing technology for enhancing the visual appearance of images. This paper presents an effective and efficient image enhancem...