LEADER 04593nam 22007575 450 001 9910298989003321 005 20200703223528.0 010 $a3-319-07356-7 024 7 $a10.1007/978-3-319-07356-9 035 $a(CKB)3710000000125836 035 $a(EBL)1783038 035 $a(SSID)ssj0001274323 035 $a(PQKBManifestationID)11749270 035 $a(PQKBTitleCode)TC0001274323 035 $a(PQKBWorkID)11326246 035 $a(PQKB)10197109 035 $a(MiAaPQ)EBC1783038 035 $a(DE-He213)978-3-319-07356-9 035 $a(PPN)179764357 035 $a(EXLCZ)993710000000125836 100 $a20140609d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPervasive Wireless Environments: Detecting and Localizing User Spoofing /$fby Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (79 p.) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $aDescription based upon print version of record. 311 $a1-322-13652-1 311 $a3-319-07355-9 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntroduction -- Feasibility of Launching User Spoofing -- Attack Detection Model -- Detection and Localizing Multiple Spoofing Attackers.-Detecting Mobile Agents Using Identity Fraud -- Related Work -- Conclusions and Future Work. 330 $aThis Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device?s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security. 410 0$aSpringerBriefs in Computer Science,$x2191-5768 606 $aComputer security 606 $aComputer communication systems 606 $aComputers 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aComputers. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aInformation Systems and Communication Service. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 700 $aYang$b Jie$4aut$4http://id.loc.gov/vocabulary/relators/aut$0859922 702 $aChen$b Yingying$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTrappe$b Wade$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aCheng$b Jerry$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298989003321 996 $aPervasive Wireless Environments: Detecting and Localizing User Spoofing$91918836 997 $aUNINA