Multiple Spoofing Identification For Network Level Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian mixture model, RSS and K-means cluster analysis. None of the approach can determine number of attackers when used the same identity by adversaries. And the other techniques used to localize the attack detection Chen-et-al studied how to localize adversaries but can only handle only a single attack this study cannot detect if the attacker use different transmission power levels for sniffing the network. Where it is not possible to gain the knowledge needed to implement. We can overcome these approaches disadvantages by using our proposed system. We use ABP, Silence Mechanism, SVM for our proposed system, beside of the algorithms based on Radargridded algorithm, Bayesian network for the graphical identity, cluster analysis and the area based probability.
Authors and Affiliations
G. Srikanth, M. Ashok Kumar
A Hybrid Routing Protocol for Unobservable Security in Mobile Ad-hoc Networks
Security of mobile ad hoc network is crucial due to infra structure less network and mobility of wireless media. In this paper, we propose an Hybrid Routing Protocol for Unobservable Secured (HRPUS) to offer privacy...
Performance Analysis of Pilot Based Channel Estimation in OFDM System using Recursive Least Square Estimator
For a wireless communication system, the channel is unknown a priori to the receiver. Channel parameter estimation is used for improving data transmission performance. To estimate the channel properties and correct t...
Transient Authentication
In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various...
A Novel Protocol To Implement The Solution On Mobile And Desktop Machine For Location Based Queries
We put into practice an answer on a desktop machine and a mobile device to measure the competence of our protocol. We also bring in a safety replica and examine the safety in the circumstance of our protocol. At leng...
An Effective Cost Optimization for Thickness Measurement of Metallic Plates
A sensor is a device which receives and responds to a signal when touched. A sensor's sensitivity indicates how much the sensor's output changes when the measured quantity changes. It measures a physical quantity and...