Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. We calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable. Security from Vampire attacks entails that this ratio is 1. Energy use by malicious nodes is not measured since they can always unilaterally sewer their own batteries. We present a sequence of increasingly damaging Vampire attacks estimate the vulnerability of several example protocols and propose how to improve elasticity. In source routing protocols we show how a malicious packet source can indicate paths through the network which are far longer than optimal wasting energy at middle nodes who forward the packet based on the included source route.
Authors and Affiliations
S. Vivekananda devi Beebi Sufia Sheik
Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors
Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...
Intuitionistic Fuzzy Sets: New Approach and Applications
This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...
Greedy Algorithm for Hub Selection in Interactive Network Applications
Many multiple users interaction in network applications such as teleconferencing, network gaming and online trading are gaining popularity but these applications require that the delay difference in between multiple...
Short Term Load Forecasting OF 132/33Kv Maiduguri Transmission Substation Using Artificial Neural Network (ANN)
This paper presents a novel approach for 1 to 24 hours ahead load forecasting using multilayer perceptron (MLP) also referred to as multilayer feed forward artificial neural network (ANN) of a utility company located...
Data Stream Mining using Reinforcement Learning: A Survey
Large numbers of real world applications are producing continuous and large data streams for further analysis. Data stream mining is allowing users to extracts knowledge in the form of patterns or model from the cont...