Indexing Metadata

1 Title of the Article Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network
2 Author's name Cherukuri Srikanth : is currently pursuing masters degree program in embedded system technology in SRM University, India, PH- +919043638514.
3 Author's name K. Vadivukkarasi
4 Subject Computer Science & Engineering
5 Keyword(s) Mac Address, Cryptography, Encryption, Decryption, WSN, Zigbee, RSSI.
6 Abstract

Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a variety of attacks with little effort .These attacks affect the network performance and leads to easy access of secured data .The main aim of this project is to detect and prevent unauthorized access of wireless data from spoofed using Zigbee technology. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, these approaches are not always desirable because of their overhead requirements .In this project, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity, and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.

7 Publisher Innovative Research Publication
8 Journal Name; vol., no. International Journal of Innovative Research in Computer Science & Technology (IJIRCST); Volume-3 Issue-2
9 Publication Date March 2015
10 Type Peer-reviewed Article
11 Format PDF
12 Uniform Resource Identifier https://ijircst.org/view_abstract.php?title=Detection-and-Localization-of-Multiple-Spoofing-Attackers-Using-Asymmetric-Key-Cryptography-Algorithm-for-Wireless-Sensor-Network&year=2015&vol=3&primary=QVJULTE3OA==
13 Digital Object Identifier(DOI)  
14 Language English
15 Page No 94-98

Indexed by

Crossref logo