Downloads: 134 | Views: 275
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.9 / 10
Vampire Attacks: Draining Life from Wireless Ad-hoc Sensor Networks
Trupti Pawar, Jyoti Patil
Abstract: Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This work explores resource depletion attacks, which permanently disable networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. Two types of vampire attacks are considered. In the carousel attack, attackers introduce some packet within a route as a sequence of loops and in the stretch attack, attackers construct falsely long routes. Whenever these two attacks are occurred the energy consumption is more as compared to the normal communication and data will reach very late to the destination. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Mitigation method used in this work is based on time, that is time taken by carousel and stretch attacks is compared with the time of normal communication and if the time in both the attacks is greater, than the new path is formed. Results shows, that secured transmission is done in the nodes by overcoming the vampire attacks, where the data travels in the honest route by mitigating the vampire attacks.
Keywords: Denial of service, security, routing, ad-hoc networks, sensor networks, wireless networks
Edition: Volume 4 Issue 9, September 2015
Pages: 264 - 268
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 428 - 429An Approach for Traffic Prediction in SDN for Performing Routing
H. Pavithra, Dr. G. N. Srinivasan