Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Low power Wireless sensor network is getting more attention recently by the researchers due to its security issues on denial of communication at the routing or medium access control levels. In this work we discussed a method to explore the attacks in routing protocol layer, which permanently disable networks by draining battery power. These “Vampire” attacks protocol dependent. It is a difficult task to determine these attacks except sending only protocol-compliant messages and detect it. Sometimes, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Here we discuss a method/ protocol to decrease the risk and damage during the packet forwarding phase.
Authors and Affiliations
Dantam. Ramesh, Dasari . Koteswara Rao
Lifetime Enhancement of Wireless Sensor Networks Through Overhead Reduction
Wireless Sensor Networks (WSNs) can provide low cost solutions to various real world problems. WSNs consist of spatially dispersed autonomous sensors to monitor physical or environmental condition, such as sound, tem...
Heterogeneous Framework for Indian Cybercrime Cases
The internet has served as the global language of the virtual world since the beginning of the digital world and the Internet in India is increasing rapidly .Internet served seriously in many more areas in current sc...
Minimising Attacks Using ATPG On Networks
Today's networks require much human involvement to keep them working. Everyday network engineers struggle with router mis-configurations, fibercuts, faulty interfaces, mislabelled cables, software bugs, intermittent...
A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...
Verification of Metadata by Encryption for Data Storage Security in Cloud
Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus...