Secure localization of multiple spoofing attackers

M. Vijayalakshmi, S. Banumathi
{"title":"Secure localization of multiple spoofing attackers","authors":"M. Vijayalakshmi, S. Banumathi","doi":"10.1109/ICICES.2014.7033896","DOIUrl":null,"url":null,"abstract":"Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable. Because of their cryptographic security approaches are overhead requirements. In this concepts, have to proposed to using spatial information, an every node associated with the physical property node, hard to falsify, and not reliant on cryptography, as the basis for 1) spoofing attacks are detecting; 2)The number of attackers are determining when multiple hackers are masquerading has the same identity node; and 3) multiple adversaries are localizing. We have to use propose the spatial correlation of received signal strength (RSS). In this RSS is inherited to the spoofing attacks are detect. We then formulate the problem of determining the number of attackers as a multiclass detection problem. To developed a Cluster-based mechanisms, which is used to determine the number of attackers. In addition, terms are developed an integrated by using detection and localization system that can be localize the positions of multiple attackers.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Communication and Embedded Systems (ICICES2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2014.7033896","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable. Because of their cryptographic security approaches are overhead requirements. In this concepts, have to proposed to using spatial information, an every node associated with the physical property node, hard to falsify, and not reliant on cryptography, as the basis for 1) spoofing attacks are detecting; 2)The number of attackers are determining when multiple hackers are masquerading has the same identity node; and 3) multiple adversaries are localizing. We have to use propose the spatial correlation of received signal strength (RSS). In this RSS is inherited to the spoofing attacks are detect. We then formulate the problem of determining the number of attackers as a multiclass detection problem. To developed a Cluster-based mechanisms, which is used to determine the number of attackers. In addition, terms are developed an integrated by using detection and localization system that can be localize the positions of multiple attackers.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多个欺骗攻击者的安全定位
欺骗攻击很容易被释放,并且会严重影响网络的性能。如果要对节点进行身份验证,可以通过密码学方法进行验证。加密身份验证,传统的安全方法并不总是可取的。因为它们的加密安全方法是开销要求。在这一概念中,不得不提出利用空间信息,将每个节点与物理属性节点相关联,难以伪造,且不依赖于密码学,作为1)欺骗攻击被检测的基础;2)当多个伪装的黑客具有相同的身份节点时,攻击者的数量正在确定;3)多个对手正在本地化。我们不得不提出接收信号强度(RSS)的空间相关性。在此RSS是继承到欺骗攻击被检测。然后,我们将确定攻击者数量的问题表述为一个多类检测问题。开发了一个基于cluster的机制,用于确定攻击者的数量。此外,还利用检测和定位系统开发了一个集成的术语,可以对多个攻击者的位置进行定位。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Performance of Distributed Sensing Algorithms with Correlated Noise and Defective Sensors Real-time Tracking of Non-rigid Objects A Linear Dependence Based Construction Related to Costas Arrays Strategy of SinkTrail protocol for energy efficient data gathering in wireless sensor network Fabric quality testing using image processing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1