A Review on Vampire Attacks in ad hoc Wireless Networks

Abstract

A new class of resource consumption attacks is Vampire Attacks. Such attacks use different routing protocols to disable the ad hoc wireless networks by depleting the battery power of the node. Devices in ad hoc wireless networks require energy as their power supply because they are not in wired network. Power limitation in the network is one of the major issue. These attacks particularly expose the protocols by highlighting the vulnerabilities. Vampire attacks reduce the power of nodes by sending the message to the nodes which cause more power to be consumed by the network which in turn permanently disable the network. This paper contains the effect of Vampire attacks on wireless ad hoc networks and thus reduction in QoS.

Authors and Affiliations

Divya Gautam, Dheeraj Pal

Keywords

Related Articles

Embedded Voice Controlled Computer For Visually Impaired and Physically Disabled People Using Arm Processor

This paper gives the design and implementation of embedded voice controlled system using ARM cortex A7 for visually impaired and physically challenged people. ARM cortex A7 has features such as low power consuming than...

Survey on IIR and FIR Digital Filter

Digital filters has developed a lot of applications on different fields. Fundamentally, Filters are used to remove the unwanted frequencies from applied signal which have both wanted and unwanted signals. Digital filter...

Enhancing the Performance of Natural High Oleic Ester based Mixed Oil Paper with Nano Insulating Liquid for High Voltage Transformer

Nowadays insulation paper for high voltage transformer is based on natural ester due to increase in bio degradability and operating life. Recently oil selection based on unsaturated fatty acid content was proposed and t...

Access Control List

With the growth of internetwork, ACL’s have now become very important for network administrator. ACL’s are one of the main features of today’s internetwork router. Routers generally check each incoming packet against th...

Some Enestrom- Kakeya Type Results

In this paper we prove some Enestrom-Kakeya type results on the location of zeros of a polynomial. Mathematics Subject Classification (2010): 30C10, 30C15.

Download PDF file
  • EP ID EP22556
  • DOI -
  • Views 243
  • Downloads 5

How To Cite

Divya Gautam, Dheeraj Pal (2016). A Review on Vampire Attacks in ad hoc Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(8), -. https://europub.co.uk/articles/-A-22556