DISCOVERY OF FOOLING ATTACKS IN WLAN-BAESD LOCATING SYSTEMS USING WIFI HOTSPOT TAGS
Abstract
Policies, procedures, and practices used to prevent, detect and monitor unauthorized access, misuse, modification, or denial of electronic network and network access resources. Network security includes authorization for data access over the network network, which is controlled by the network administrator. Users select or are given an ID and password, or other verification information that enables them to access information and applications under their jurisdiction. Link error and malicious packet pull are two sources of packet loss on many wireless network networks. With this paper, while looking at the sequence of packet loss within a network, we are interested in determining whether the loss is caused by link errors only, or by a combined result of link errors and dangerous decline. In the case of internal attacks, malicious nodes that are part of the router use their knowledge of the content of the network to minimize the number of packets that are critical to network performance. Common algorithms that are supported to detect packet loss rates are unable to obtain satisfactory satisfactory accuracy. Creating a public homomorphic linear research framework (HLA) that allows the detector to verify the accuracy of packet loss data reported by nodes. This construction maintains privacy, proof of cooperation, and introduces lower and more secure connections. Reducing the basic computing rate of the basic system, further enhances the packet-block-based process, which allows one to trade the accuracy of the acquisition with minimal computational complexity
Author
1 S. Subathra, 2 V. Nandini, 3 P. Samuktha, 4 S. Vinodhini
Download