<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>ijesm</PublisherName>
      <JournalTitle>International Journal of Engineering, Science and</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 2, Issue 1</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Multidisciplinary</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March 2013</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2013</Year>
        <Month>01</Month>
        <Day>6</Day>
      </PubDate>
      <ArticleType>Engineering, Science and Mathematics</ArticleType>
      <ArticleTitle>OPTIMAL ACTIVE EAVESDROPPING USING PSO</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>201</FirstPage>
      <LastPage>207</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Arya Thampi? Franklin George</FirstName>
          <LastName>Jobin</LastName>
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
        </Author>
      </AuthorList>
      <DOI/>
      <Abstract>Eavesdropping is the act of secretly listening to the private conversation of others without their consent .In this paper explains how we can identify an active eavesdropper in the communication channel and how to drop it. We derive a new security attack from the pilot contamination phenomenon using PSO. Among the variety of threats and risks that wireless LANs are facing, session hijacking attacks are common and serious ones. Current techniques for detecting session hijacking attacks are mainly based on spoofable and predictable parameters such as sequence numbers, which can be guessed by the attackers.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>BPSK Modulation,wavelet transform,CSI,PSO,Eavesdropping</Keywords>
      <URLs>
        <Abstract>https://ijesm.co.in/ubijournal-v1copy/journals/abstract.php?article_id=2907&amp;title=OPTIMAL ACTIVE EAVESDROPPING USING PSO</Abstract>
      </URLs>
      <References>
        <ReferencesarticleTitle>References</ReferencesarticleTitle>
        <ReferencesfirstPage>16</ReferencesfirstPage>
        <ReferenceslastPage>19</ReferenceslastPage>
        <References/>
      </References>
    </Journal>
  </Article>
</ArticleSet>