SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 9
Abstract
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofers and localization of the same is a challenging task in wireless sensor network. This paper presents expository survey of various spoofing attack detection techniques in wireless sensor network.
Authors and Affiliations
P. KIRUTHIKA DEVI , Dr. R. MANAVALAN
Prime Generating Algorithms by Skipping Composite Divisors
Three elementary versions of simple prime generating sieves have already been improved by skipping even divisors other than 2. All composite integers are multiples of primes. Taking help of the transitivity property of d...
An approach of curing Depression by Artificial Neural Networks(ANN) Approach with 5 Input Node Reviewing 3 Input Node
Psychologists have various medical ways to treat depression using counseling, medicines and much more. These ways do not guarantee that depression is totally cured. Depression affects the neurons in brain, decreasing the...
Survey Report on Software Cost Estimation using Use Case Point Method
Software estimation is an important activity in software project management. Many software projects fail because of the inaccurate and untimely estimation of cost. Estimation in the early stages of the software life cycl...
A Systematic Survey report on Various Frameworks and Models for Verification of Choreography in SOA
Service- Oriented Architecture (SOA) is a mainstream strategy for improving IT performance. Web Services are self-contained internet enabled applications which are capable of performing business activities. Web Services...
Hilditch’s Algorithm Based Tamil Character Recognition
Character identification plays a vital role in the contemporary world of Image processing. It can solve many composite problems and makes human’s work easier. An instance is Handwritten Character detection. Handwritten r...