Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-8 of 8 total results
 DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN ...
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi1, Umamaheswari2 and A.Vijayaraj 3 1Department of Computer Applications, Dhanalakshmi College of Engineering, Chennai, India
Localizing Multiple Adversaries in Wireless Spoofing Attacks
We further developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings.
https://core.ac.uk/display/23541023
Average Rating (0 votes)
DoS Attack Prevention Technique in Wireless Sensor ...
There are different techniques to prevent DoS attack in wireless sensor network. In this paper, an immune system is proposed for the DoS attack on WSN which will improve the accuracy rate of attack prevention, reduce the false alarm rate and able to recognize different Dos attack. © 2016 The Authors....
Review on Detection and Mitigation of Sybil Attack in the ...
Sybil attack is an attack in which the identities of the node are subverted and the large number of pseudonymous identities is produced to gain the access of the network. In this paper, we studied the detection mechanism of Sybil attack in peer-to-peer reputation systems, self-organizing networks and even social network systems....
Intrusion Detection & Prevention | Systems to Detect ...
Upon detecting a security policy violation, virus or configuration error, an IDS is able to kick an offending user off the network and send an alert to security personnel. Despite its benefits, including in-depth network traffic analysis and attack detection, an IDS has inherent drawbacks.
Pervasive Wireless Environments: Detecting and Localizing ...
This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation.
 Localizing Jammers in Wireless Networks
ing the dependability of wireless network deployments will become an issue of critical importance. One serious class of ... techniques. In these systems, spreading techniques (e.g. fre- ... Our work focuses on localizing jammers after jamming attacks have been identified using the proposed jamming detection strategies....
Comparing the top wireless intrusion prevention systems
Enterprise wireless intrusion prevention systems have been helping organizations detect and block wireless local area network (LAN) attacks for quite some time. In the early days, wireless ...