Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks

Abstract

Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed a method to explore the attacks in routing protocol layer, which permanently disable networks by draining battery power. These “Vampire” attacks protocol dependent. It is a difficult task to determine these attacks except sending only protocol-compliant messages and detect it. Sometimes, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Here we discuss a method/ protocol to decrease the risk and damage during the packet forwarding phase.

Authors and Affiliations

Dantam. Ramesh, Dasari . Koteswara Rao

Keywords

Related Articles

A New Approach For Automate Test case Generation Covering Branches In Software Testing

Testing is the process of evaluating a system or its components intended to find that whether it satisfies the specified requirements or not. Testing is executing a system in order to identify any gaps, errors or mis...

Design of Modulo 2n-1 based on Radix-8 Algorithm for RNS & MAC Applications

A new architecture, namely, Multiplier-and Accumulator (MAC) based Radix-8 Booth Encoded modulo 2n-1 Multiplication Algorithm for high-speed arithmetic logics have been proposed and implemented on Xilinx FPGA device....

Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques

Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields...

An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks

Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and process...

Infrequent Defense System for mobile networks through Miscellaneous Contraption

Malware is malevolent programming which irritates the system PC operation, hacking the touchy data and gets to the private frameworks. It is only a project which is particularly intended to harm the PC it might be an...

Download PDF file
  • EP ID EP28015
  • DOI -
  • Views 257
  • Downloads 0

How To Cite

Dantam. Ramesh, Dasari . Koteswara Rao (2014). Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28015