Pervasive Wireless Environments: Detecting and Localizing User Spoofing Pervasive Wireless Environments: Detecting and Localizing User Spoofing
SpringerBriefs in Computer Science

Pervasive Wireless Environments: Detecting and Localizing User Spoofing

Jie Yang y otros
    • USD 39.99
    • USD 39.99

Descripción editorial

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method.
This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device’s identity to detect mobile attackers. A final chapter covers future directions of this field.
By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.

GÉNERO
Informática e Internet
PUBLICADO
2014
9 de junio
IDIOMA
EN
Inglés
EXTENSIÓN
80
Páginas
EDITORIAL
Springer International Publishing
VENDEDOR
Springer Nature B.V.
TAMAÑO
2.3
MB
Web Engineering Web Engineering
2025
Proceedings of the First International Conference on Engineering Structures Proceedings of the First International Conference on Engineering Structures
2025
Pattern Analysis and Machine Intelligence Pattern Analysis and Machine Intelligence
2025
Current and Future Application of Artificial Intelligence in Clinical Medicine Current and Future Application of Artificial Intelligence in Clinical Medicine
2021
Machine Learning Aided Analysis, Design, and Additive Manufacturing of Functionally Graded Porous Composite Structures Machine Learning Aided Analysis, Design, and Additive Manufacturing of Functionally Graded Porous Composite Structures
2023
Control and Communication for Demand Response with Thermostatically Controlled Loads Control and Communication for Demand Response with Thermostatically Controlled Loads
2022
Introduction to Ethical Software Development Introduction to Ethical Software Development
2025
Digital Image Forgery Detection Digital Image Forgery Detection
2025
Blockchain Without Barriers Blockchain Without Barriers
2025
Human Reconstruction Using mmWave Technology Human Reconstruction Using mmWave Technology
2025
Intelligent Localization for Integrated Sensing and Communication Intelligent Localization for Integrated Sensing and Communication
2025
Secure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems Secure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems
2025