Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks

Abstract

We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. We calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable. Security from Vampire attacks entails that this ratio is 1. Energy use by malicious nodes is not measured since they can always unilaterally sewer their own batteries. We present a sequence of increasingly damaging Vampire attacks estimate the vulnerability of several example protocols and propose how to improve elasticity. In source routing protocols we show how a malicious packet source can indicate paths through the network which are far longer than optimal wasting energy at middle nodes who forward the packet based on the included source route.

Authors and Affiliations

S. Vivekananda devi Beebi Sufia Sheik

Keywords

Related Articles

A Survey on Multipath Routing Protocols for Reliable Data Transmission in Wireless Sensor Networks

Multipath routing approach is used in wireless sensor networks to improve network performance through efficient utilization of available network resources. In Wireless sensor networks (WSNs) many multipath routing pro...

http://www.ijrcct.org/index.php/ojs/article/view/555/pdf

Cloud computing provides a huge data services to the user in an easy and comfortable way over the internet. We presenting a new platform for cloud computing called Data Protection as a Service which is significantly...

Detection of Precise C/C++ Memory Leakage by diagnosing Heap dumps using Inter procedural Flow Analysis statistics

Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficu...

A Novel Approach to Determine the Rules for Web Page Prediction using Dynamically Chosen K-Order Markov Models

The problem of predicting user’s behavior on a Web site has fundamental significance due to the rapid growth of the World Wide Web. Recent research initiatives have addressed the need for improved performance of Web...

Design and Implementation of FPGA Radix-4 Booth Multiplication Algorithm

Fast multipliers are essential parts of digital signal processing systems.The system performance is based on the performance of multiplier used in the system, because it is the slowest component among all components...

Download PDF file
  • EP ID EP28086
  • DOI -
  • Views 246
  • Downloads 0

How To Cite

S. Vivekananda devi Beebi Sufia Sheik (2014). Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk./articles/-A-28086