Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. We calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable. Security from Vampire attacks entails that this ratio is 1. Energy use by malicious nodes is not measured since they can always unilaterally sewer their own batteries. We present a sequence of increasingly damaging Vampire attacks estimate the vulnerability of several example protocols and propose how to improve elasticity. In source routing protocols we show how a malicious packet source can indicate paths through the network which are far longer than optimal wasting energy at middle nodes who forward the packet based on the included source route.
Authors and Affiliations
S. Vivekananda devi Beebi Sufia Sheik
Design of Reversible Mod-16 Synchronous Counter
Reversible logic is very important in lowpower circuit design and quantum computing. And also Reversible logic is gaining interest in the recent past Due to its less heat dissipating characteristics. A lot of researc...
A Study on Security Advances for LEACH in WSN
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....
VLSI Implementation and Design of Digital Modulation Using Xilinx
In this Paper, Digital Modulators is designed and Implemented using XILINX ISE Tool based on Very Large Scale Integration (VLSI). This is majorly to implement and obtain digitalize signals in softwaredefined radio (SD...
An Enhanced Technique for Transferring the Image Using Wavelet SVD Mosaic Images Under Color Retrieval Mode
Insurance about advanced media content need turned into a progressively paramount issue for content managers also administration suppliers. Likewise watermark distinguished about illustration, a major engineering org...
Network Coding Equivalent Content Distribution (NCECD) Scheme in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks that However has been limit...