alexa Spoofing Attacks Detection and Localizing Multiple Adv
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks

Pallavi D.Sontakke 1, Prof.Dr.C.A.Dhote 2
  1. PG Student, Dept. of I.T, Prof Ram Meghe Institute of Technology & Research Badnera, Amravati, India
  2. Professor, Dept. of I.T., Prof Ram Meghe Institute of Technology & Research Badnera, Amravati, India
Related article at Pubmed, Scholar Google


Wireless networks provide various advantages in real world. This can help businesses to increase their productivity, lower cost and effectiveness, increase scalability and improve relationship with business partners and attract customers. Communication in wireless network is critical and challenging issue. Wireless spoofing attacks are occurs easily and reduce the networks performance. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. The traditional approach to detect spoofing attacks is to apply cryptographic authentication. Here using spatial information, a physical property of each node, so hard to falsify and not depend on cryptographic security, on the beginning for (1) detecting spoofing attacks; (2) determining the number of attackers when multiple node pretend as a same node identity, and (3) localizing multiple adversaries. Here using the correlation between a signal's spatial direction and the average received signal gain of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. Then the problem of determining the number of attackers as multiclass detection problem is formulated. Cluster-based mechanisms are developed to determine the number of attackers. When the training data is available, Support Vector Machines (SVM) method is used to further improve the accuracy of determining the number of attackers. The approach can both detects the presence of attacks as well as determine the number of adversaries, spoofing the same node identity, also that can localize any number of attackers and eliminate them.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version