Detect, Localize and Estimate the number of Spoofing Attackers in Wireless Network

Deepthy Mary Mathai, T. K Parani
2014 International Journal of Engineering Trends and Technoloy  
Wireless Networks collect and disseminate data from the fields where ordinary networks are unreachable.Wireless network system is prone to various types of attacks. Various attacks are Eavesdropping, DoS, Spoofing, etc. Among the common attacks, spoofing attacks has large impact on system's security. Conventional methods using cryptography introduces overhead problems. Spoofing Attacks can be launched with little effort as the wireless medium is shared. Spoofing attack affect the system
more » ... the system performance. Spoofing attack on mobile wireless devices may inflict security and privacy damages on social life of Spoofing are also called IP address Forgery. In the context of network security, a spoofing Attack is a situation which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. In this project SILENCE mechanism is used to find number of attackers. GADE technique is used to find presence of attacker in wireless network. IDOL system is to localize attackers. Simulation is performed in Network Simulator.
doi:10.14445/22315381/ijett-v7p269 fatcat:v6rgf3vt6zb4dpqdayn6tpoyty