TRACKING AND PREVENTING THE MULTIPLE SPOOFING ATTACKS IN WIRELESS NETWORKS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 11
Abstract
Wireless Networks are more vulnerable to spoofing attacks which can be launched easily and considered as one of the most challenging, but these attacks have huge impact on the network performance. In this paper, we aim to propose a theory based on a physical property that cannot be altered, and does not depend on any of cryptographic approach, as medium for 1) Detection of spoofing attacks occurred in the network, 2) Determining the number of attackers present in the network 3) Localizing all adversaries and elimination them from the network and 4) Preventing these attackers from rejoining the network. We intend to use the spatial correlation of RSS readings that are acquired from wireless nodes to track down the attacker. Further, Cluster based mechanisms can be helpful in calculating the number of adversaries in the network. Distance-based Detection and Localization (DDL) will assist to accurately locate the attackers in the network while MAC address allocation scheme using MD5 hashing technique is applied to prevent the attacks. Hence, we can recover the network performance with high accuracy rate.
Authors and Affiliations
Dharmaji V. Manjrekar
An Investıgatıon of Wınd Characterıstıcs for Optımum Wınd Energy Utılızatıon at the Campus of Rajıv Gandhı Technıcal Unıversıty, Bhopal,Indıa
Energy is an essential ingredient of socio-economic development and economic growth. Renewable energy sources like wind energy is one of the most significant and rapidly developing renewable energy sources in the world...
PRESERVING IDENTITY OF SHARED DATA STORED IN THE CLOUD USING PUBLIC AUDIT MECHANISM
Cloud Computing has been envis ioned as the next - generation architecture of IT Enterprise. The application software and databases are moved to the centralized large data centers, where managing the da...
DETECTION OF MALICIOUS NODE IN WIRELESS SENSOR NETWORK
The intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a field. The intrusion detection is defined as a system for a WSN to detect t...
Investigating the Hydrological Characteristics of Kaduna River Basin
The water resource potential of the Kaduna River for use in irrigation development and water resource management has been studied. The water conveyance efficiencies of the river channels are very low that develop...
ERROR DETECTION USIN G BINARY BCH (255, 2 15, 5) CODES
Error - correction codes are the codes used to correct the errors occurred during the transmission of the data in the unreliable communication medi ums. Error detection is the detection of errors caused by noise or...