Tracking of Local Area Adversaries in Wireless Sensor Networks
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2014 by IJCTT Journal|
|Year of Publication : 2014|
|Authors : P. Seetha Ramakrishna , P. Samba Siva Rao , Abdul Vahed|
P. Seetha Ramakrishna , P. Samba Siva Rao , Abdul Vahed "Tracking of Local Area Adversaries in Wireless Sensor Networks". International Journal of Computer Trends and Technology (IJCTT) V18(4):125-128, Dec 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
now a day spoofing has occupied in many network areas. Mainly it will effect on the networks, because everyone is copying the others things and implementing then we can do all things very simply and we can launch this process easily. In the network each and every data in sharing has been used by cryptographic from. To stop the spoofing and to identify this we are implemented a some of the methods that we are done in step by step to overcome the problem and to detect the spoofing. They are as follows i) finding the attacking situations ii) counting the attacks and identifying its location in the network. iii) finding the localized attacking things in the network. here in this paper we are proposed a concept of RSS (receiving signal strength) through this concept we will the information about the nodes and its related networking position strength to find the total hitting and the localization process of attacks in the network.
 J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. USENIX Security Symp., pp. 15-28, 2003.
 F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004.
 D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006.
 Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006.
 B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks,” Proc.IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005.
 A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.
 Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008.
networking, spoofing, identification, detection process, wireless network.