期刊名称:Journal of Theoretical and Applied Information Technology
印刷版ISSN:1992-8645
电子版ISSN:1817-3195
出版年度:2014
卷号:67
期号:2
出版社:Journal of Theoretical and Applied
摘要:Wireless spoofing attacks are easy to launch in wireless network due to openness of wireless network. Although the identity of a node can be detected through cryptographic authentication, conservative security approaches are not always possible because of their overhead requirements. Source sends a Data to the destination, Data is forwarded to the intermediate nodes in between source and destination, with respect to Received Signal Strength(RSS). In this paper to detect the identity based attacks and multiple adversaries as well as localizing the adversaries. Detect the position of multiple adversaries even when the adversaries vary their transmission power level. We propose to use the spatial correlation of received signal strength(RSS) inherited from wireless nodes to detect the attacks. We are also using primary key and encrypting the data packets during transmission for security purpose. By encrypting the data packets the intermediate nodes are not able to view the data presented in the data packets. Experiments using an 802.11 (Wi-Fi) network, We use network simulation to analyse the performance of the results.