Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks

Abstract

We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. We calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable. Security from Vampire attacks entails that this ratio is 1. Energy use by malicious nodes is not measured since they can always unilaterally sewer their own batteries. We present a sequence of increasingly damaging Vampire attacks estimate the vulnerability of several example protocols and propose how to improve elasticity. In source routing protocols we show how a malicious packet source can indicate paths through the network which are far longer than optimal wasting energy at middle nodes who forward the packet based on the included source route.

Authors and Affiliations

S. Vivekananda devi Beebi Sufia Sheik

Keywords

Related Articles

An Overview on Template Matching Methodologies and its Applications

A very common task in pattern recognition is template matching. The detection and recognition of objects in images is a key research topic in the computer vision community. Within this area, image recognition and in...

Ensuring Data Storage Security in a Cloud Computing Using ‘MONA’

Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing. Identity privacy and Privacy preserving from an entrusted cloud is still a challenging issue....

Secure Data Storage And Retrieve From Cloud Networking With Multiple Encrypt System

The proposed work is to characterize cloud structural engineering with designed samba stockpiling what's more cryptographic encryption systems. The cloud structural engineering sent with samba stockpiling uses workin...

Cybernetic Technology Utility: Scrupulous Heroes v. Unscrupulous Individuals – Ending Corruption in SA

Corruption on South African (SA) roads is so overwhelming that it has reached such proportions where some motorists now see it as the only way to go. On the contrary, things seem to have started turning the other way...

Enhanced Intrusion Detection System with Mobile Agent

This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...

Download PDF file
  • EP ID EP28086
  • DOI -
  • Views 259
  • Downloads 0

How To Cite

S. Vivekananda devi Beebi Sufia Sheik (2014). Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28086