Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks

@article{Yang2009DeterminingTN,
  title={Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks},
  author={Jie Yang and Yingying Chen and Wade Trappe and Jay Cheng},
  journal={IEEE INFOCOM 2009},
  year={2009},
  pages={666-674}
}
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use location information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for (1) detecting spoofing attacks; (2… CONTINUE READING
Highly Cited
This paper has 36 citations. REVIEW CITATIONS

From This Paper

Figures, tables, results, and topics from this paper.

Key Quantitative Results

  • Our experimental results show that SILENCE can achieve over 90% Hit Rate and Precision when determining the number of attackers.
24 Citations
24 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 24 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 24 references

Similar Papers

Loading similar papers…