Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. It explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. All routing protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. A single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. The project implements methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase using PLGP’s clean safe secure protocol.
Authors and Affiliations
V. Prudhvi Sai , G. Rama Koteswara rao , V. Radhe Shyam
Evaluation of Forecast Scheme Performances Based on Statistical Error Measurements
This paper will review various forecast schemes. Some of the forecast schemes are based on data mining. Forecast schemes are introduced to reduce urban traffic congestion and to manage the travel information. The und...
Design of Automatic Automobile using CAN Bus
CAN is a serial bus protocol to connect individual systems and sensors as an alternative to conventional multi-wire looms. It allows automotive components to communicate on a single or dual-wire networked data bus up...
Design of Efficient DSP operation using 16×16 R-MAC Unit
As we already know that the multiplication and accumulation are the vital operations involved in DSP `applications. In DSP processor we need high speed performance for different applications. In order to increase thi...
Iris Data Hiding, Encoding By Using Huffman Coding DWT, SVD Scheme Authenticated By Multi SVM
As the technology advances in day to day life, the process of illegal data copies are producing by miscreants with ease. Various techniques are introducing to protect the copy right data from the miscreants. One such...
Detection Of Connected But A Cut Occurred Somewhere (Ccos) In Wireless Sensor Networks
A wireless sensor network is able to obtain detached into several connected components owing of the crash of some of its intersection, which is entitle such as “cut”. Herein, we deem the problem of detecting cuts as...