Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. It explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. All routing protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. A single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. The project implements methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase using PLGP’s clean safe secure protocol.
Authors and Affiliations
V. Prudhvi Sai , G. Rama Koteswara rao , V. Radhe Shyam
Privacy Preserving Web Search Techniques : A Survey Study
A large amount of personal information is available on the web about any individual. S uch information could be used to make vital decisions about them. S o it is important to protect the privacy of individuals when...
Comparing Tesseract results with and without Character localization for Smartphone application
Tesseract is considered the most accurate free OCR engine in existence. Android operating system based Smartphones application where images taken from camera of mobile device or browsed from gallery are preprocessed....
Performance Optimization in Wireless Channel Using Adaptive Fractional Space CMA
In many high-data-rate band limited digital communication systems, the transmission of a training sequence is either impractical or very costly in terms of data throughput. Conventional LMS adaptive filters dependin...
Secured Architecture To Access Cloud Based Services
Cloud computing is new software IT revolution refers to the delivery of computer resources over the internet. Cloud storage is about much more than hosting online media. You need to deliver online media content, such...
Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study
Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...