{"title":"多个欺骗攻击者的安全定位","authors":"M. Vijayalakshmi, S. Banumathi","doi":"10.1109/ICICES.2014.7033896","DOIUrl":null,"url":null,"abstract":"Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable. Because of their cryptographic security approaches are overhead requirements. In this concepts, have to proposed to using spatial information, an every node associated with the physical property node, hard to falsify, and not reliant on cryptography, as the basis for 1) spoofing attacks are detecting; 2)The number of attackers are determining when multiple hackers are masquerading has the same identity node; and 3) multiple adversaries are localizing. We have to use propose the spatial correlation of received signal strength (RSS). In this RSS is inherited to the spoofing attacks are detect. We then formulate the problem of determining the number of attackers as a multiclass detection problem. To developed a Cluster-based mechanisms, which is used to determine the number of attackers. In addition, terms are developed an integrated by using detection and localization system that can be localize the positions of multiple attackers.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"02 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure localization of multiple spoofing attackers\",\"authors\":\"M. Vijayalakshmi, S. Banumathi\",\"doi\":\"10.1109/ICICES.2014.7033896\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable. Because of their cryptographic security approaches are overhead requirements. In this concepts, have to proposed to using spatial information, an every node associated with the physical property node, hard to falsify, and not reliant on cryptography, as the basis for 1) spoofing attacks are detecting; 2)The number of attackers are determining when multiple hackers are masquerading has the same identity node; and 3) multiple adversaries are localizing. We have to use propose the spatial correlation of received signal strength (RSS). In this RSS is inherited to the spoofing attacks are detect. We then formulate the problem of determining the number of attackers as a multiclass detection problem. To developed a Cluster-based mechanisms, which is used to determine the number of attackers. In addition, terms are developed an integrated by using detection and localization system that can be localize the positions of multiple attackers.\",\"PeriodicalId\":13713,\"journal\":{\"name\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"volume\":\"02 1\",\"pages\":\"1-7\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2014.7033896\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Communication and Embedded Systems (ICICES2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2014.7033896","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure localization of multiple spoofing attackers
Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable. Because of their cryptographic security approaches are overhead requirements. In this concepts, have to proposed to using spatial information, an every node associated with the physical property node, hard to falsify, and not reliant on cryptography, as the basis for 1) spoofing attacks are detecting; 2)The number of attackers are determining when multiple hackers are masquerading has the same identity node; and 3) multiple adversaries are localizing. We have to use propose the spatial correlation of received signal strength (RSS). In this RSS is inherited to the spoofing attacks are detect. We then formulate the problem of determining the number of attackers as a multiclass detection problem. To developed a Cluster-based mechanisms, which is used to determine the number of attackers. In addition, terms are developed an integrated by using detection and localization system that can be localize the positions of multiple attackers.