Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks

Abstract

Ad hoc less power wireless networks are one of the current topics in the field of security and pervasive computing. Most of the research work done before for improving the security of the networks in this area is mainly limited to the denial of message at the routing level or MAC levels. This project work investigates the attacks done with an aim of resource reduction at the routing protocol layer. These attacks can lead to the quick draining of the nodes battery power there by permanently disable the networks. These resource depletion attacks are called as “Vampire” attacks, which are not particular to any protocol, instead they depends on the general features of the routing protocols classes. In some of the bad cases, a particular vampire can increases network-wide bandwidth usage in the order of O (N). Present techniques to overcome these attacks were discussed, including one new protocol has been demonstrated which has successfully reduced the affects of the vampires while forwarding the packet as per the simulation results in the testing environment modeled in this work. A public key algorithm named Elliptic Curve Cryptography (ECC) algorithm is also used for more security provision.

Authors and Affiliations

Pavani Potnuri| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P pavani_875@yahoo.co.in, Bharath Kumar Gowru| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P bharath.kumar436@gmail.com, Venkateswara Rao Nadakuditi| Assistant Professor in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P n.venkat056@gmail.com

Keywords

Related Articles

Design Analysis of Low Speed Flywheels For Automobiles

This paper concentrates on investigating the impacts of flywheel geometry on its vitality stockpiling or convey capacity per unit mass, additionally characterized as most extreme particular vitality. In this paper we...

Explication Search Results From Huge Amount Of Published Data

The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexi...

A New Hybrid Topology of D-STATCOM for Power Quality Improvement

This work proposes an enhanced new breed conveyance static compensator (D-STATCOM) topology to address some down to earth issues, for example, power rating, filter size, performance of compensation, and power misfortu...

We propose a novel locality sensitive low-rank model for picture label finishing, which approximates the worldwide nonlinear model with a gathering of neighbourhood direct models. To viably imbue the possibility of t...

An Additive Order And Privacy Preserving Function Family (AOPPF)

The plentiful benefits of cloud computing, for privacy concerns, individuals and enterprise users are disinclined to outsource their susceptible data, including emails, personal health records and government confiden...

Download PDF file
  • EP ID EP16638
  • DOI -
  • Views 308
  • Downloads 11

How To Cite

Pavani Potnuri, Bharath Kumar Gowru, Venkateswara Rao Nadakuditi (2015). Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks. International Journal of Science Engineering and Advance Technology, 3(11), 963-968. https://europub.co.uk/articles/-A-16638