Identity Based Replicated Node Detection and Localization in Wireless Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Wireless networks are more prone towards identity-based attacks, especially the spoofing attacks. These spoofing attacks can further cause many other forms of attacks such as rouge access point attack and denial of service attacks (DOS). Hence the performance of the network is significantly impacted by them. Identity of the node can be verified through cryptographic authentication; however the conventional security approaches are not always possible because it requires infrastructural overhead and key management. In this paper we propose a method for detecting the spoofing attacks. This method utilizes MD5 (Message Digest 5) algorithm, which generates unique identification keys for all the nodes in the network. These unique keys are used as a basis for detecting the attacks and determining the actual number of attackers in the network and to localize these adversaries. Results of the project show that, the proposed method effectively detects the attack and locates the position of the adversaries performing the attack. There by it provides strong evidence to the effectiveness of the proposed method.
Authors and Affiliations
Deepa Hurali , Prof. Vidya R. Kulkarni
Internet Worm Classification and Detection using Data MiningTechniques
Abstract: Internet worm means separate malware computer programs that repeated itself and in order to spreadone computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan...
Semantic Web Data Mining & Analysis
Abstract: Semantic Web Mining combines two fast developing research areas: Semantic Web & Web Mining. In this relation, the research intension is to improve on the one hand, Web mining methods with new needs of seman...
Cloud Computing –Its Prospects and Challenges
Abstract: The extensive use of information and communication technology has transformed manufacturing organizations and economies into information centric and customer focused organizations. In present times, the i...
An Enhanced Area Reduction Technique for Integrated Circuit using Genetic Algorithm
Genetic algorithms are implemented as a computer simulation in which a population of abstract representations (called chromosomes or the genotype or the genome) of candidate solutions (called individuals, creatures, or p...
Automatic Face Recognition Using Gabor Wavelet and Robust Structured Spares Representation
Automatically facial recognition has become more and more important today. But FR still remains a challenge problem in computer vision .so in this paper we proposed a new approach that use Gabor wavelet for facial...