For Queries/Clarification

alameenpublications@gmail.com

e-ISSN 2455-9288

Why publish with

ijaser

IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.

DISCOVERY OF FOOLING ATTACKS IN WLAN-BAESD LOCATING SYSTEMS USING WIFI HOTSPOT TAGS

Abstract

Policies, procedures, and practices used to prevent, detect and monitor unauthorized access, misuse, modification, or denial of electronic network and network access resources. Network security includes authorization for data access over the network network, which is controlled by the network administrator. Users select or are given an ID and password, or other verification information that enables them to access information and applications under their jurisdiction. Link error and malicious packet pull are two sources of packet loss on many wireless network networks. With this paper, while looking at the sequence of packet loss within a network, we are interested in determining whether the loss is caused by link errors only, or by a combined result of link errors and dangerous decline. In the case of internal attacks, malicious nodes that are part of the router use their knowledge of the content of the network to minimize the number of packets that are critical to network performance. Common algorithms that are supported to detect packet loss rates are unable to obtain satisfactory satisfactory accuracy. Creating a public homomorphic linear research framework (HLA) that allows the detector to verify the accuracy of packet loss data reported by nodes. This construction maintains privacy, proof of cooperation, and introduces lower and more secure connections. Reducing the basic computing rate of the basic system, further enhances the packet-block-based process, which allows one to trade the accuracy of the acquisition with minimal computational complexity

Author

1 S. Subathra, 2 V. Nandini, 3 P. Samuktha, 4 S. Vinodhini
Download