Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure

Abstract

A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although using different packet headers. We calculate the potency of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the relation of network-wide power operation with malicious nodes present to energy procedure with only honest nodes when the number and size of packets sent remains stable. Safety from Vampire attacks involves that this ratio is 1. Energy use by malicious nodes is not considered since they can forever unilaterally drain their own batteries. However believe the procedure of routing a packet in any multihop network. A cause creates and transmits it to the next hop toward the destination which transmits it further until the destination is reached consuming resources not only at the source node but also at each node the message moves through. If we consider the growing energy of an entire network amplification attacks are forever probable given that an opponent can compose and send messages which are practiced by each node along the message path.

Authors and Affiliations

G. Harsha Vardhan, Ch. Udaya Bhaskar

Keywords

Related Articles

Intuitionistic Fuzzy Sets: New Approach and Applications

This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...

Functioning Estimation of Tcp Variants and Directing Etiquettes in Flexible Ad-Hoc Set of Connections

Mobile Ad-hoc Network (MANET) is an accumulation of cell phones rapidly shaping a correspondence system with no brought together control and prior system foundation. Because of the vicinity of versatility in the MANE...

Implementation of Symmetric Stream Cipher for Text Encryption Using Key Sequence of Cyclic Elliptical Curve Points Based on PRNG

In this paper, cyclic elliptic curves of the form y2 = x 3 + ax + b mod p € E(Fp) with order N is considered in the design of a symmetric key text Encryption Scheme with Key Sequence derived from random sequence of...

A Study of Intrusion Detection Systems in MANETs

In past years, the use of mobile ad hoc networks (MANETs) has been widely spread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs...

Sentiment Analysis Approach for Movie Reviews of Natural Language

Sentimental Analysis (SA) or Opinion Mining (OM) refers to the application of NLP, computational linguistics, and text analytics to identify and extract subjective information in source materials. It involves classif...

Download PDF file
  • EP ID EP28121
  • DOI -
  • Views 234
  • Downloads 0

How To Cite

G. Harsha Vardhan, Ch. Udaya Bhaskar (2014). Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28121