Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed a method to explore the attacks in routing protocol layer, which permanently disable networks by draining battery power. These “Vampire” attacks protocol dependent. It is a difficult task to determine these attacks except sending only protocol-compliant messages and detect it. Sometimes, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Here we discuss a method/ protocol to decrease the risk and damage during the packet forwarding phase.
Authors and Affiliations
Dantam. Ramesh, Dasari . Koteswara Rao
A New Approach For Automate Test case Generation Covering Branches In Software Testing
Testing is the process of evaluating a system or its components intended to find that whether it satisfies the specified requirements or not. Testing is executing a system in order to identify any gaps, errors or mis...
Design of Modulo 2n-1 based on Radix-8 Algorithm for RNS & MAC Applications
A new architecture, namely, Multiplier-and Accumulator (MAC) based Radix-8 Booth Encoded modulo 2n-1 Multiplication Algorithm for high-speed arithmetic logics have been proposed and implemented on Xilinx FPGA device....
Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields...
An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks
Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and process...
Infrequent Defense System for mobile networks through Miscellaneous Contraption
Malware is malevolent programming which irritates the system PC operation, hacking the touchy data and gets to the private frameworks. It is only a project which is particularly intended to harm the PC it might be an...