Detecting Spoofing Attack in Cluster based Wireless System

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 2, Issue 1, No 2, 2014.

Copyright: All Rights Reserved ©2014

Year of Publication: 2014

Author: P.Saranya, B.UshaRanjini


View PDF Format


Wireless networks square measure liable to uniqueness-based attacks, like spoofing attacks. The wireless spoofing attacks square measure simple to take-off and may considerably influence the performance of networks. Predictably, scientific discipline authentication helps in making certain identity of somebody and detects the unauthorized user. Awkwardly, full scale authentication isn't fascinating as if needs coupled further infrastructure overhead, key management and additional wide-ranging computations. The non-cryptographic mechanism won’t to attest and may discover device spoofing or no dependency on scientific discipline keys. The MD5 (Message Digest 5) algorithmic program are utilized by generalized Spoofing attack detection to come up with distinctive symbol for every wireless nodes. During this paper, we have a tendency to propose to use property related to every nodes, laborious to falsify, and not dependent on cryptography, because the basis for 1) spoofing attack detection; 2) range of attackers square measure determined once multiple adversaries masquerading because the same node identity; and 3) multiple adversaries localization. To work out the amount of attackers, cluster-based mechanisms has introduced. To enhance the accuracy of determinant the amount of attackers, Support Vector Machines (SVM) has introduced.


[1] P.RameshBabu et al.: A Comprehensive Analysis of spoofing (International Journal of Advanced Computer Science and Application, 2010) [2] IyadAldasouqi et al.: Detecting and Localizing Wireless Network Attacks Techniques (IJCSS, 2010) [3] P.InfantKingsly et al.: Smart Way for Secured Communication in Mobile Ad-hoc Networks (IJCII, 2012)



This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

Facebook IconYouTube IconTwitter IconVisit Our Blog