|
|
Showing 1 - 1 of
1 matches in All Departments
This Springer Brief provides a new approach to prevent user
spoofing by using the physical properties associated with wireless
transmissions to detect the presence of user spoofing. The most
common method, applying cryptographic authentication, requires
additional management and computational power that cannot be
deployed consistently. The authors present the new approach by
offering a summary of the recent research and exploring the
benefits and potential challenges of this method. This brief
discusses the feasibility of launching user spoofing attacks and
their impact on the wireless and sensor networks. Readers are
equipped to understand several system models. One attack detection
model exploits the spatial correlation of received signal strength
(RSS) inherited from wireless devices as a foundation. Through
experiments in practical environments, the authors evaluate the
performance of the spoofing attack detection model. The brief also
introduces the DEMOTE system, which exploits the correlation within
the RSS trace based on each device s identity to detect mobile
attackers. A final chapter covers future directions of this field.
By presenting complex technical information in a concise format,
this brief is a valuable resource for researchers, professionals,
and advanced-level students focused on wireless network security."
|
You may like...
Not available
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.