Manuscript Number : CSEIT1722224
Establishing the Anonymity to Mitigate Identity Based Attacks
Authors(5) :-Revathi V, Guganesan E, Surya Prasanth M, Tharani M, Uthra P Identity information of the devices are the significant factor to establish the adversaries in the network. Sybil attacks are executed by capturing the IP address and Mac address of the victim devices. Location and channel based information are extracted to eliminate these attacks from the network. But the cooperative attacks can able to capture the data information by providing the fake channel and location information. The Location Distinction model is fails to identify the Identity based attacks when the victim and malicious devices are present in same location. The proposed hashing based anonymity approach can able to prevent the identity based attacks.
Revathi V Mac Address, victim devices, identity based attacks, sybil attacks, IDAS, NIDAS, MDM, XML, QoS, BNFA Publication Details Published in : Volume 2 | Issue 2 | March-April 2017 Article Preview
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Guganesan E
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Surya Prasanth M
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Tharani M
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Uthra P
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Date of Publication : 2017-04-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 621-633
Manuscript Number : CSEIT1722224
Publisher : Technoscience Academy