Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. We calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable. Security from Vampire attacks entails that this ratio is 1. Energy use by malicious nodes is not measured since they can always unilaterally sewer their own batteries. We present a sequence of increasingly damaging Vampire attacks estimate the vulnerability of several example protocols and propose how to improve elasticity. In source routing protocols we show how a malicious packet source can indicate paths through the network which are far longer than optimal wasting energy at middle nodes who forward the packet based on the included source route.
Authors and Affiliations
S. Vivekananda devi Beebi Sufia Sheik
Improved Algorithm for Prediction of Heart Disease Using Case based Reasoning Technique on Non-Binary Datasets
Frequent itemset mining is a basic problem in data mining and knowledge discovery. The discovered patterns can be used as input for Association and Classification. Association Rules and Classification Rules have been...
WSN Based Industrial Environmental Monitoring System Using µC/OS-II
The paper describes the performance and functional characteristics of arm7 embedded microprocessor and Micro C/OS-II based wireless sensor node (WSN) in monitoring the parameters such as temperature, humidity, gas an...
Resource Provisioning Techniques in Cloud Computing Environment: A Survey
Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned a...
Optimum Loss Allocation in Radial Distribution Systems
In this paper, the proposed method has the advantage that no assumptions are made in the allocation of real power losses as opposed other algorithms available in the literature. A detailed comparison of the real loss...
High Efficiency and Less Pollutant Power PlantsUsing Biomass Mixed with Municipal Solid Waste and coal Dust
This paper deals with the new component of fuel which is used to generate the power with higher efficiency and lesser pollutants. The new component is the mixture of biomass (husk) and MSW and coal dust in the ratio o...