Articles with "masquerading attacks" as a keyword



Photo by majesticlukas from unsplash

Masquerading Attacks Detection in Mobile Ad Hoc Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2872115

Abstract: Due to the lack of centralized identity management and the broadcast nature, wireless ad hoc networks are always a palatable target for masquerading attacks. The attackers can spoof identities of privileged legitimate users for various… read more here.

Keywords: signal strength; masquerading attacks; detection; hoc networks ... See more keywords