Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks

Abstract

Ad hoc less power wireless networks are one of the current topics in the field of security and pervasive computing. Most of the research work done before for improving the security of the networks in this area is mainly limited to the denial of message at the routing level or MAC levels. This project work investigates the attacks done with an aim of resource reduction at the routing protocol layer. These attacks can lead to the quick draining of the nodes battery power there by permanently disable the networks. These resource depletion attacks are called as “Vampire” attacks, which are not particular to any protocol, instead they depends on the general features of the routing protocols classes. In some of the bad cases, a particular vampire can increases network-wide bandwidth usage in the order of O (N). Present techniques to overcome these attacks were discussed, including one new protocol has been demonstrated which has successfully reduced the affects of the vampires while forwarding the packet as per the simulation results in the testing environment modeled in this work. A public key algorithm named Elliptic Curve Cryptography (ECC) algorithm is also used for more security provision.

Authors and Affiliations

Pavani Potnuri| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P pavani_875@yahoo.co.in, Bharath Kumar Gowru| Assistant Professor, in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P bharath.kumar436@gmail.com, Venkateswara Rao Nadakuditi| Assistant Professor in Dept of CSE, Amrita Sai Institute of Science & Technology,paripala,Krishna dist.A.P n.venkat056@gmail.com

Keywords

Related Articles

Distributed Access Control With Unknown Validation Of Information Stored In Clouds

We propose another decentralized access control plan for secure information storage in clouds that backings anonymous validation. In the proposed plan, the cloud checks the arrangement's legitimacy without knowing th...

An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network

Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to tradeoffs among communication and computational requirements. An algorithm for distributed solution of certain polynomials over l...

Permitting Data Active For Cloud Processing Storage Method

Cloud service providers are having service metrics and service dimensions. With out these the cloud computing will not be executed. So we are providing saas , paas and iaas are providing for cloud with permitting dat...

CP-ABE Scheme With User Revocation For Cloud Storage System

We give a (CP-ABE) plot with proficient client renouncement for distributed storage framework. The issue of client disavowal can be understood proficiently by presenting the idea of client group. At the point when an...

An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing

Software as a Service (SaaS) is an important flavor of cloud computing to provide comprehensive Business emulsion. modernization in cloud computing are foremost to a promising future for cloud association, where wide...

Download PDF file
  • EP ID EP16638
  • DOI -
  • Views 301
  • Downloads 11

How To Cite

Pavani Potnuri, Bharath Kumar Gowru, Venkateswara Rao Nadakuditi (2015). Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks. International Journal of Science Engineering and Advance Technology, 3(11), 963-968. https://europub.co.uk./articles/-A-16638