Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks

Abstract

We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. We calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable. Security from Vampire attacks entails that this ratio is 1. Energy use by malicious nodes is not measured since they can always unilaterally sewer their own batteries. We present a sequence of increasingly damaging Vampire attacks estimate the vulnerability of several example protocols and propose how to improve elasticity. In source routing protocols we show how a malicious packet source can indicate paths through the network which are far longer than optimal wasting energy at middle nodes who forward the packet based on the included source route.

Authors and Affiliations

S. Vivekananda devi Beebi Sufia Sheik

Keywords

Related Articles

Security Monitoring System Design Based on ARM9 and Embedded Face Recognition System

In this paper, proposed system is designed to recognize the person based on preloaded database images in controller. Our Embedded system using Friendly ARM9 based BSP S3C2440 has feature of image/video processing with...

Efficient Defence System For Avoid Malware Propagation In Mobile Network

We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...

Scalable Technique to Answer Continuous Aggregation Queries Using Network Of Aggregators Of Dyanmic Data Items

Continuous aggregation queries are used to monitor the changes in data with time varying for online decision making. For continuous queries, a low-cost and scalable technique using a network of aggregators. Individua...

Elimination Of Repeated Data Copies With Enhanced Security In Hcloud

Intending at economically solving the trouble of deduplication with discrepancy privileges in cloud computing we regard as a hybrid cloud structural design consisting of a public cloud and a private cloud. Dissimilar...

Autograph Protocol for Wireless Sensor Networks

A wealth of innovative opportunities exists for a mobile communications solution that can reliably communicate data without the need for fixed network infrastructure. A key element of any communications system is the...

Download PDF file
  • EP ID EP28086
  • DOI -
  • Views 227
  • Downloads 0

How To Cite

S. Vivekananda devi Beebi Sufia Sheik (2014). Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28086