Volume- 3
Issue- 2
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Cherukuri Srikanth , K. Vadivukkarasi
Due to the openness of the wireless transmission medium, adversaries can monitor any transmission. Further, adversaries can easily purchase low-cost wireless devices and use these commonly available platforms to launch a variety of attacks with little effort .These attacks affect the network performance and leads to easy access of secured data .The main aim of this project is to detect and prevent unauthorized access of wireless data from spoofed using Zigbee technology. Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, these approaches are not always desirable because of their overhead requirements .In this project, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for detecting spoofing attacks, determining the number of attackers when multiple adversaries masquerading as the same node identity, and localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.
[1]kiran nayak nanda, tulasi dwarakanath, haribabu,”data centre monitoring and alerting system using wsn” in 2014 IEEE conecct 1569825779.
[2]junbeom hur and kyungtae kang, ”secure data retrieval for decentralized disruption tolerant military network”,member,IEEE,acm vol.22 no.1 february 2014.
[3]archana tayal, prachi,’energy efficient new symmetric key algorithm for wsn” [4]zibee alliance, zigbee specification version 17,jan 2008.
[5]D.baghyalakshmi,jemimahEbenezer,s.a.vsatyamurthy, 2011 ”wsn based temperature monitoring for high performance computing on recent trends in information technology”, ICRTIT.
[6]Ritika Sharma, kamalesh gupta, oct 2012,” international journal of computer applications (0975-8887) volume 56- no.15.
[7] ravindra navanath puche for nisha p.sarwade , February 2014 ”sensor node failure selection based on round trip delay for paths in wsn” IEEE sensor, Journal, vol 14, no.2.
is currently pursuing masters degree program in embedded system technology in SRM University, India, PH- +919043638514.
No. of Downloads: 11 | No. of Views: 1131
Manali Shukla, Ishika Goyal, Bhavya Gupta, Jhanvi Sharma.
July 2024 - Vol 12, Issue 4
Dipti Prajapati, Samishtarani Sabat, Sanika Bhilare, Rashmi Vishe, Prof. Suman Bhujbal.
March 2024 - Vol 12, Issue 2
Anu Sharma, Vivek Kumar.
May 2023 - Vol 11, Issue 3