Annapoorani.T, Kanchana.K
Wireless Systems are now popular worldwide to help people and machines to communicate with each other irrespective of their location, where it has an endless quest for increased capacity and improved quality. Although there are many advantages but it still has some disadvantages. This paper deals with the vulnerabilities in the wireless systems. The vulnerabilities present in the wireless technology that are mostly related to threats and risks. Though much vulnerability are in the wireless systems this paper mainly deals with the spoofing attacks. In wireless systems the adversaries can launch any type of attacks to steal the data and to slowdown the performance of the network. The main cause of this paper is to convey that wireless systems need a stronger mechanism. So we also propose to perform hardware implementation using a Zig bee transceiver which uses the standard (802.15.4) mainly based on Zigbee protocol Stack.