Free shipping on orders over $99
Pervasive Wireless Environments: Detecting and Localizing User Spoofing

Pervasive Wireless Environments: Detecting and Localizing User Spoofing

Detecting and Localizing User Spoofing

by Yingying ChenJerry Cheng Jie Yang and others
Paperback
Publication Date: 14/07/2014

Share This Book:

  $111.38
or 4 easy payments of $27.84 with
afterpay
This item qualifies your order for FREE DELIVERY
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method.
This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device's identity to detect mobile attackers. A final chapter covers future directions of this field.
By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.
ISBN:
9783319073552
9783319073552
Category:
Computer security
Format:
Paperback
Publication Date:
14-07-2014
Language:
English
Publisher:
Springer International Publishing AG
Country of origin:
Switzerland
Pages:
72
Dimensions (mm):
235x155x4mm
Weight:
1.36kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Pervasive Wireless Environments: Detecting and Localizing User Spoofing.