{"title":"欺骗攻击:防止在无线网络","authors":"S. Raguvaran","doi":"10.1109/ICCSP.2014.6949811","DOIUrl":null,"url":null,"abstract":"Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Spoofing attack: Preventing in wireless networks\",\"authors\":\"S. Raguvaran\",\"doi\":\"10.1109/ICCSP.2014.6949811\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.\",\"PeriodicalId\":149965,\"journal\":{\"name\":\"2014 International Conference on Communication and Signal Processing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Communication and Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSP.2014.6949811\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Communication and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSP.2014.6949811","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.