Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 11
Abstract
Ad hoc less power wireless networks are one of the current topics in the field of security and pervasive computing. Most of the research work done before for improving the security of the networks in this area is mainly limited to the denial of message at the routing level or MAC levels. This project work investigates the attacks done with an aim of resource reduction at the routing protocol layer. These attacks can lead to the quick draining of the nodes battery power there by permanently disable the networks. These resource depletion attacks are called as “Vampire†attacks, which are not particular to any protocol, instead they depends on the general features of the routing protocols classes. In some of the bad cases, a particular vampire can increases network-wide bandwidth usage in the order of O (N). Present techniques to overcome these attacks were discussed, including one new protocol has been demonstrated which has successfully reduced the affects of the vampires while forwarding the packet as per the simulation results in the testing environment modeled in this work. A public key algorithm named Elliptic Curve Cryptography (ECC) algorithm is also used for more security provision.
Authors and Affiliations
Pavani Potnuri| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P pavani_875@yahoo.co.in, Bharath Kumar Gowru| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P bharath.kumar436@gmail.com, Venkateswara Rao Nadakuditi| Assistant Professor in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P n.venkat056@gmail.com
Detection of Masquerade Attacks using Data-Driven Semi-Global Alignment Approach
The broad utilization of virtualization in representing security basis conveys unrivaled security worries for inhabitants or clients and presents an extra layer that itself must be totally arranged and secured. Gatec...
Protection of “Fault Tolerant Parallel Filters†by Hamming code with Reversible logic
Advanced channels are generally utilized as a part of flag preparing and correspondence frameworks. Now and again, the dependability of those frameworks is basic, and blame tolerant channel executions are required. T...
Quantify and Examined Of Video Distribution Sites For Appreciative Links
Videos are an integral part of current information technologies and the snare. The demand for efficient retrieval rises with the increasing number of videos, which is equally true for video annotation techniques as matad...
Unique value disintegration for probing results using clustering algorithm
This paper describes gene expression analysis by Unique Value Disintegration(UVD), emphasizing initial characterization of the data. We describe UVD methodsfor visualization of gene expression data, representation of...
Explicit Uncertainty word directing through Data Mining
Searching a keyword on an enormous a colossal is somewhat easier, however the search over a enlarge range of structured and connected information creates a problem. Routing keywords solely to applicable sources will...