Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 11
Abstract
Ad hoc less power wireless networks are one of the current topics in the field of security and pervasive computing. Most of the research work done before for improving the security of the networks in this area is mainly limited to the denial of message at the routing level or MAC levels. This project work investigates the attacks done with an aim of resource reduction at the routing protocol layer. These attacks can lead to the quick draining of the nodes battery power there by permanently disable the networks. These resource depletion attacks are called as “Vampire†attacks, which are not particular to any protocol, instead they depends on the general features of the routing protocols classes. In some of the bad cases, a particular vampire can increases network-wide bandwidth usage in the order of O (N). Present techniques to overcome these attacks were discussed, including one new protocol has been demonstrated which has successfully reduced the affects of the vampires while forwarding the packet as per the simulation results in the testing environment modeled in this work. A public key algorithm named Elliptic Curve Cryptography (ECC) algorithm is also used for more security provision.
Authors and Affiliations
Pavani Potnuri| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P pavani_875@yahoo.co.in, Bharath Kumar Gowru| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P bharath.kumar436@gmail.com, Venkateswara Rao Nadakuditi| Assistant Professor in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P n.venkat056@gmail.com
Harmonic Compensation of Distribution generation Using Photovoltaic Interfacing Inverter
Normally increasing utilization of electronic devices in homes leads the researchers to concentrate on harmonic problem Besides the degrading power quality, the harmonic current flow may interfere with the adjacent t...
An FPGA Implementation Of Real-Time Finger-Vein Recognition System For Security Levels
In this project, we propose a real-time embedded finger-vein recognition system (FVRS) for authentication on mobile devices. The system is implemented on an embedded platform and equipped with a novel finger-vein rec...
A Novel Subset Selection Clustering-Based Algorithm for High Dimensional Data
Feature selection, also known as variable selection, attribute selection or variable subset selection, is the process of selecting a subset of relevant features (variables, predictors) for use in model construction....
A Authentication model to Trustees based Social Networks
authenticating users with the help of their friends has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s frien...
The ever-increasing integration of highly diverse enabled data generating technologies in medical, biomedical and healthcare fields and the growing availability of data at the central location that can be used in nee...