Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks

Abstract

Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed a method to explore the attacks in routing protocol layer, which permanently disable networks by draining battery power. These “Vampire” attacks protocol dependent. It is a difficult task to determine these attacks except sending only protocol-compliant messages and detect it. Sometimes, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Here we discuss a method/ protocol to decrease the risk and damage during the packet forwarding phase.

Authors and Affiliations

Dantam. Ramesh, Dasari . Koteswara Rao

Keywords

Related Articles

Lifetime Enhancement of Wireless Sensor Networks Through Overhead Reduction

Wireless Sensor Networks (WSNs) can provide low cost solutions to various real world problems. WSNs consist of spatially dispersed autonomous sensors to monitor physical or environmental condition, such as sound, tem...

Heterogeneous Framework for Indian Cybercrime Cases

The internet has served as the global language of the virtual world since the beginning of the digital world and the Internet in India is increasing rapidly .Internet served seriously in many more areas in current sc...

Minimising Attacks Using ATPG On Networks

Today's networks require much human involvement to keep them working. Everyday network engineers struggle with router mis-configurations, fibercuts, faulty interfaces, mislabelled cables, software bugs, intermittent...

A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam

In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...

Verification of Metadata by Encryption for Data Storage Security in Cloud

Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus...

Download PDF file
  • EP ID EP28015
  • DOI -
  • Views 253
  • Downloads 0

How To Cite

Dantam. Ramesh, Dasari . Koteswara Rao (2014). Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28015