A Review on Vampire Attacks in ad hoc Wireless Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 8
Abstract
A new class of resource consumption attacks is Vampire Attacks. Such attacks use different routing protocols to disable the ad hoc wireless networks by depleting the battery power of the node. Devices in ad hoc wireless networks require energy as their power supply because they are not in wired network. Power limitation in the network is one of the major issue. These attacks particularly expose the protocols by highlighting the vulnerabilities. Vampire attacks reduce the power of nodes by sending the message to the nodes which cause more power to be consumed by the network which in turn permanently disable the network. This paper contains the effect of Vampire attacks on wireless ad hoc networks and thus reduction in QoS.
Authors and Affiliations
Divya Gautam, Dheeraj Pal
Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor
This paper gives the design and implementation of embedded voice controlled system using ARM cortex A7 for visually impaired and physically challenged people. ARM cortex A7 has features such as low power consuming than...
Survey on IIR and FIR Digital Filter
Digital filters has developed a lot of applications on different fields. Fundamentally, Filters are used to remove the unwanted frequencies from applied signal which have both wanted and unwanted signals. Digital filter...
Enhancing the Performance of Natural High Oleic Ester based Mixed Oil Paper with Nano Insulating Liquid for High Voltage Transformer
Nowadays insulation paper for high voltage transformer is based on natural ester due to increase in bio degradability and operating life. Recently oil selection based on unsaturated fatty acid content was proposed and t...
Access Control List
With the growth of internetwork, ACL’s have now become very important for network administrator. ACL’s are one of the main features of today’s internetwork router. Routers generally check each incoming packet against th...
Some Enestrom- Kakeya Type Results
In this paper we prove some Enestrom-Kakeya type results on the location of zeros of a polynomial. Mathematics Subject Classification (2010): 30C10, 30C15.