Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. It explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. All routing protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. A single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. The project implements methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase using PLGP’s clean safe secure protocol.
Authors and Affiliations
V. Prudhvi Sai , G. Rama Koteswara rao , V. Radhe Shyam
Image Encryption Using Modified Particle Swarm Optimization
In this age of universal electronic connectivity, there is indeed no time at which security does not matter. Two trends have enough to make this work as vital need. First, the explosive growth in computer systems and...
Web Application: Performance Testing Using Reactive Based Framework
Web application performance testing plays an important role in providing Quality of Service (QoS). Performance testing is very important for satisfying users. This research paper presents performance testing of web a...
Transient Authentication
In recent years, many people use their office or home PC for their work and store the sensitive information, at the same time mobile computing has enjoyed a Persistent tremendous rise in popularity. There are various...
NEURAL NETWORK & GENETIC ALGORITHM BASED FACE RECOGNITION SYSTEM
Facial image analysis plays a significant role for human computer interaction. Automatic analysis of human face is still a challenging and emerging problem with many applications. In this paper, we proposed a neural...
Review on Algorithms and Techniques of Reversible Data Hiding
Nowadays, with the rapid development of information technology more and more images and data are available on the internet..So there is a need to provide some kind of authentication to such important data. With the i...