M Jain, H Kandwal - … on Advances in Computing, Control, and …, 2009 - ieeexplore.ieee.org
… Wireless communication faces several security risks. An attacker can easily inject bogus
packets, impersonating another sender. We refer to this attack as a spoofing attack. …