SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 9
Abstract
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofers and localization of the same is a challenging task in wireless sensor network. This paper presents expository survey of various spoofing attack detection techniques in wireless sensor network.
Authors and Affiliations
P. KIRUTHIKA DEVI , Dr. R. MANAVALAN
Predictive time series analysis of stock prices using neural network classifier
The work pertains to developing financial forecasting systems which can be used for performing an in-depth analysis of the stocks prices, downloading/importing data from the various locations and analyzing that data and...
A Survey on Feedback base Trust Evaluation for Cloud Environment
Cloud computing widely adopted by enterprises and individuals. Cloud computing provide several advantages but still there are many obstacles in cloud. Trust plays major role in commercial cloud environments. In the envir...
On Demand Routing Protocols in Mobile Ad-hoc Networks: Literature Review
Routing in MANETs may be a difficult task and has received an amazing quantity of attention from researchers round the world. To beat this downside variety of routing protocols are developed and also the number remains i...
Offline Handwritten & Typewritten Character Recognition using Template Matching
In the modern times identity verification has become an important task for various reasons. Mostly identity provided by the authorities is the combination of characters & digits. Now there are several techniques avai...
Importance & Applications of Digital Image Processing
Digital image processing has become economical in many fields like signature recognition, iris recognition and face recognition, in forensics, in automobile detection and in military applications. Each of these applicati...