Security Measures To Prevent Vampire Attacks To Protect Routing Infrastructure
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 12
Abstract
A Vampire attack is the composition and transmission of a message that sources more power to be consumed by the network than if an open node transmitted a message of the same size to the same destination although using different packet headers. We calculate the potency of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the relation of network-wide power operation with malicious nodes present to energy procedure with only honest nodes when the number and size of packets sent remains stable. Safety from Vampire attacks involves that this ratio is 1. Energy use by malicious nodes is not considered since they can forever unilaterally drain their own batteries. However believe the procedure of routing a packet in any multihop network. A cause creates and transmits it to the next hop toward the destination which transmits it further until the destination is reached consuming resources not only at the source node but also at each node the message moves through. If we consider the growing energy of an entire network amplification attacks are forever probable given that an opponent can compose and send messages which are practiced by each node along the message path.
Authors and Affiliations
G. Harsha Vardhan, Ch. Udaya Bhaskar
Cloud Removal from Satellite using Cloning Method
Cloud removal approach based on information cloning is introduced. In this methodology it evacuates all cloud sullied segments of a satellite picture and it is then recreates the data which contains taking so as to miss...
The Safety Framework in Network Security utilizing Cryptographic Systems
Remote Sensor Networks comprise of independent sensor hubs appended to one or more base stations.As Wireless sensor systems proceed to grow, they get to be helpless against assaults and subsequently the requirement f...
Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication
Cooperative communications enables efficient utilization of system communication resources, thereby allowing nodes or terminals participating in a communication network to collaborate with each other during informatio...
Expressive Cryptosystem for Accessible Data Sharing in Cloud Storage
Cloud storage is getting especially acclaimed these days. The two huge workplaces that cloud give are data stockpiling and data sharing. An ensured data sharing in cloud is a basic issue. This paper goes with a consi...
Optimal Gabor Filter for Multi Scale Texture Segmentation with Color Indication
Image segmentation is the procedure of the subdivision of a picture into its constituent districts or items. The aftereffect of Image segmentation is an arrangement of sections that all in all cover the whole picture...