International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134 | Views: 242

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.9 / 10


     

Vampire Attacks: Draining Life from Wireless Ad-hoc Sensor Networks

Trupti Pawar, Jyoti Patil


Abstract: Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This work explores resource depletion attacks, which permanently disable networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. Two types of vampire attacks are considered. In the carousel attack, attackers introduce some packet within a route as a sequence of loops and in the stretch attack, attackers construct falsely long routes. Whenever these two attacks are occurred the energy consumption is more as compared to the normal communication and data will reach very late to the destination. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Mitigation method used in this work is based on time, that is time taken by carousel and stretch attacks is compared with the time of normal communication and if the time in both the attacks is greater, than the new path is formed. Results shows, that secured transmission is done in the nodes by overcoming the vampire attacks, where the data travels in the honest route by mitigating the vampire attacks.


Keywords: Denial of service, security, routing, ad-hoc networks, sensor networks, wireless networks


Edition: Volume 4 Issue 9, September 2015


Pages: 264 - 268



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Trupti Pawar, Jyoti Patil, "Vampire Attacks: Draining Life from Wireless Ad-hoc Sensor Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 264-268, https://www.ijsr.net/getabstract.php?paperid=SUB158005

Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top