Spoofing attack: Preventing in wireless networks

S. Raguvaran
{"title":"Spoofing attack: Preventing in wireless networks","authors":"S. Raguvaran","doi":"10.1109/ICCSP.2014.6949811","DOIUrl":null,"url":null,"abstract":"Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Communication and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSP.2014.6949811","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.
欺骗攻击:防止在无线网络
无线自组织网络无法抵御基于唯一性的攻击,因为它们没有集中的服务器来控制网络中的通信节点,因此许多攻击,如攻击者注入恶意节点,为节点创建虚假身份,还包括欺骗攻击,从而极大地破坏或减少了无线网络的整体常规。保守地说,要确信对话者的唯一性,并通过加密验证来感知对手或攻击者的存在。不幸的是,惟一性或身份的验证并不总是令人羡慕,因为它需要密钥服务管理,并且还需要额外的基础设施可视化投影和更一般的计算。因此,我们提出了一种能够验证和感知无线设备欺骗的方法,这种方法对加密技术的依赖很小或不依赖于加密技术,即不使用数字签名。因此,我们提出了一种有效的算法来识别无线网络中的欺骗或伪造信息以及这类攻击。为了解决无线网络中的虚假信息注入、身份盗窃攻击和IP欺骗等问题,已有许多技术被提出。为了克服之前提出的方法存在的障碍,我们实现了有效的算法来对无线设备的MAC地址进行验证和过滤。我们提出的方法由两个主要实现部分组成,以解决欺骗攻击。一部分是识别客户端地址的唯一性,另一部分是修改每个客户端的接入点控制列表。通过我们提出的技术,可以有效地识别无线网络中的欺骗或嘲弄信息攻击,并有助于利用无线网络中节点的相同唯一性识别对手。与其他方法相比,我们提出的模型可以通过使用非加密技术来提高确定无线网络攻击的准确性。通过我们的实施和结果表明,我们提出的方案与以前的系统相比是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信