Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. We calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable. Security from Vampire attacks entails that this ratio is 1. Energy use by malicious nodes is not measured since they can always unilaterally sewer their own batteries. We present a sequence of increasingly damaging Vampire attacks estimate the vulnerability of several example protocols and propose how to improve elasticity. In source routing protocols we show how a malicious packet source can indicate paths through the network which are far longer than optimal wasting energy at middle nodes who forward the packet based on the included source route.
Authors and Affiliations
S. Vivekananda devi Beebi Sufia Sheik
Tone Reservation Technique Based Clipping and Filtering Method for PAPR Reduction by Scaling Residual noise
OFDM is an extinguishly used next-generation wireless transmission technique because of its easy equalization. OFDM can send over hundreds of parallel data streams via multiple carriers which makes the possibility of...
Loss less Data Compression using DCT to Optimize the compression Ratio
This work studies of the problem and demonstrates the viability of the suggested methodology with simulation runs onthe International Symposium on Circuits and Systems (ISCAS) 85 combinational and ISCAS 89 full-scan...
Time Series Data Mining Tool
A time series is a sequence of data points, measured typically at successive points in time spaced at uniform time intervals. Time series analysis comprises methods for analyzing time series data in order to extract...
Automated Leukemia Detection using Contour Signature in Blood Microscopic Images
Out of four major types of leukemia acute lymphoblastic leukemia (ALL) is most common blood disorder in children’s of age ranging from 1-9 years. With lymphoblastic leukemia cancerous change begins in marrow cell whe...
A survey – Energy Efficient Routing protocol for Homogenous & Heterogeneous Networks
The wireless sensor networks have gained a lot of grasp in the previous years due to various encroachments in this field. One of the major challenges faced by WSNs is the problem of energy efficiency. Various routing...