Pervasive Wireless Environments: Detecting and Localizing User Spoofing

Pervasive Wireless Environments: Detecting and Localizing User Spoofing
Author :
Publisher : Springer
Total Pages : 79
Release :
ISBN-10 : 9783319073569
ISBN-13 : 3319073567
Rating : 4/5 (69 Downloads)

Book Synopsis Pervasive Wireless Environments: Detecting and Localizing User Spoofing by : Jie Yang

Download or read book Pervasive Wireless Environments: Detecting and Localizing User Spoofing written by Jie Yang and published by Springer. This book was released on 2014-06-09 with total page 79 pages. Available in PDF, EPUB and Kindle. Book excerpt: This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device’s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.


Pervasive Wireless Environments: Detecting and Localizing User Spoofing Related Books

Pervasive Wireless Environments: Detecting and Localizing User Spoofing
Language: en
Pages: 79
Authors: Jie Yang
Categories: Computers
Type: BOOK - Published: 2014-06-09 - Publisher: Springer

DOWNLOAD EBOOK

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the prese
Information and Communication Technology and Applications
Language: en
Pages: 746
Authors: Sanjay Misra
Categories: Computers
Type: BOOK - Published: 2021-02-13 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book constitutes revised selected papers from the Third International Conference on Information and Communication Technology and Applications, ICTA 2020, h
Official (ISC)2 Guide to the CSSLP CBK
Language: en
Pages: 556
Authors: Mano Paul
Categories: Computers
Type: BOOK - Published: 2013-08-20 - Publisher: CRC Press

DOWNLOAD EBOOK

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilit
Cybersecurity, Privacy and Freedom Protection in the Connected World
Language: en
Pages: 463
Authors: Hamid Jahankhani
Categories: Computers
Type: BOOK - Published: 2021-05-20 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintai
Intelligent Technologies and Techniques for Pervasive Computing
Language: en
Pages: 351
Authors: Kolomvatsos, Kostas
Categories: Computers
Type: BOOK - Published: 2013-05-31 - Publisher: IGI Global

DOWNLOAD EBOOK

Pervasive computing enables users to interact with information resources in their everyday lives. The development of computational technologies that can exist i