Results 151 to 160 of about 22,758 (191)
Some of the next articles are maybe not open access.
Analyzing Spoofing Attacks in Wireless Networks
2014 Fourth International Conference on Advanced Computing & Communication Technologies, 2014Wireless Sensor Networks is a grouping of wireless networking and entrenched system technology that monitors the physical or environmental situation, such as temperature, sound, quivering, strain, motion or pollutant, at different locations and a spoofing attack is a one of the most common online attack in which one person or program successfully ...
Keshav Jindal +2 more
openaire +1 more source
Spoofing Attacks against FM Indoor Localization
2016 International Conference on Networking and Network Applications (NaNA), 2016FM-based indoor localization identifies the location of a user by looking at the received signal strength (RSS) at the user's location. We find an effective spoofing attack that can remotely alter RSS of a target user, leading to the incorrect estimation of the user's location.
Zi Li, Yao Liu, Qingqi Pei, Lei Bai
openaire +1 more source
Secure localization of multiple spoofing attackers
International Conference on Information Communication and Embedded Systems (ICICES2014), 2014Spoofing attacks have an easy to release and can significantly impact the performance of the networks. If we want to identify the node can be verified through the cryptographic approaches. The cryptographic authentication, conventional security approaches are not always desirable.
M. Vijayalakshmi, S. Banumathi
openaire +1 more source
On mitigation of pilot spoofing attack
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters
openaire +1 more source
On Iris Spoofing Using Print Attack
2014 22nd International Conference on Pattern Recognition, 2014Human iris contains rich textural information which serves as the key information for biometric identifications. It is very unique and one of the most accurate biometric modalities. However, spoofing techniques can be used to obfuscate or impersonate identities and increase the risk of false acceptance or false rejection.
Priyanshu Gupta +3 more
openaire +1 more source
Detecting and Localizing Wireless Spoofing Attacks
2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead.
Yingying Chen +2 more
openaire +1 more source
Against Spoofing Attacks in Network Layer
2016In the context of network security, a spoofing attack is a condition in which one person or a program successfully masquerades as another. This is done by providing counterfeit data with the malicious intention of gaining an illegitimate advantage. Spoofing attack which may be generated in various layer of Open Systems Interconnection model (OSI model)
Kavisankar L. +2 more
openaire +1 more source
Face Spoofing and Presentation Attack Detection
2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 2022Anubhab Nandy, Satish Kumar Singh
openaire +1 more source
Automatic Speaker Verification Under Spoofing Attack
2021 19th OITS International Conference on Information Technology (OCIT), 2021Soumya Priyadarsini Panda, Krishna Singh
openaire +1 more source

