Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure

Abstract

A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although using different packet headers. We calculate the potency of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the relation of network-wide power operation with malicious nodes present to energy procedure with only honest nodes when the number and size of packets sent remains stable. Safety from Vampire attacks involves that this ratio is 1. Energy use by malicious nodes is not considered since they can forever unilaterally drain their own batteries. However believe the procedure of routing a packet in any multihop network. A cause creates and transmits it to the next hop toward the destination which transmits it further until the destination is reached consuming resources not only at the source node but also at each node the message moves through. If we consider the growing energy of an entire network amplification attacks are forever probable given that an opponent can compose and send messages which are practiced by each node along the message path.

Authors and Affiliations

G. Harsha Vardhan, Ch. Udaya Bhaskar

Keywords

Related Articles

A Rule Based Approach For Malayalam-English Translation

This paper presents an approach for translating simple Malayalam sentences to English. As the Malayalam language is morphologically rich, free word order and highly agglutinative it is very difficult to process the sent...

A Survey on Object Detection Tracking and Identification in a Video Surveillance System

Object tracking in a crowd remains one of the challenging problems of video surveillance system. The task of object tracking is one of the most important components of real time video surveillance and monitoring syst...

FAME: A NOVEL FRAMEWORK FOR POLICY MANAGEMENT IN FIREWALL

In this paper investigate the problem of discovering the set of troublesome rules in a large firewall policy and consequently eliminating or resolving them. all the rules in the policy are consistent and can be reord...

A Comparative Study of Text Detection Algorithms for Natural Scenes

Text detection from image is highly needed application in current techno world. However, text detection is no longer an unsolved problem as many approaches/algorithms for it are encouraged by researchers. Algorithms...

Double Compression Of JPEG Image Using DWT Over RDWT

Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the...

Download PDF file
  • EP ID EP28121
  • DOI -
  • Views 257
  • Downloads 0

How To Cite

G. Harsha Vardhan, Ch. Udaya Bhaskar (2014). Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28121