
Wireless networks have gained immense popularity in recent years. Though wireless networks have innumerous advantages over conventional wired networks, the borderless nature of wireless networks makes it prone to various felonious activities. In the context of network security, one of the most crucial vulnerabilities which have caused a serious global concern is the MAC Address Spoofing. MAC address spoofing facilitates launching of other attacks such as Denial-of-service, Man-in-the-middle, SYN flooding etc. In this paper we propose a methodology for the detection of spoofing attacks in IEEE 802.11 networks that involve performance of cluster analysis on RSS patterns of 802.11 transmitters which not only detect presence of a spoofing attack but also determine number of attackers. Further for localizing the adversaries, we propose a discriminant-adaptive neural network (DANN) based localization system.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 3 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
