Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks

Abstract

Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed a method to explore the attacks in routing protocol layer, which permanently disable networks by draining battery power. These “Vampire” attacks protocol dependent. It is a difficult task to determine these attacks except sending only protocol-compliant messages and detect it. Sometimes, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Here we discuss a method/ protocol to decrease the risk and damage during the packet forwarding phase.

Authors and Affiliations

Dantam. Ramesh, Dasari . Koteswara Rao

Keywords

Related Articles

LOAD Balancer Strategy Based On Cloud Computing

At present cloud computing is one of the utmost platform which delivers storage of data in very lower cost and accessible for all time over the internet. But it has more serious issue like security, load management a...

Rule Discovery Based Classification On Biological Dataset Using Ant Colony Optimization

Classification systems have been widely utilized in medical domain to explore patient’s data and extract a predictive model. This model helps physicians to improve their prognosis, diagnosis or treatment planning pro...

A Novel Method for Crawl Forum Threads

In internet crawler it is program that visits websites and reads their pages and other information in order to create entries for a search engine index. Now we introducing forum crawler which traverses the web forum...

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

Cooperative communications enables efficient utilization of system communication resources, thereby allowing nodes or terminals participating in a communication network to collaborate with each other during informatio...

A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time

Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In...

Download PDF file
  • EP ID EP28015
  • DOI -
  • Views 230
  • Downloads 0

How To Cite

Dantam. Ramesh, Dasari . Koteswara Rao (2014). Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28015