Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. It explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. All routing protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. A single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. The project implements methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase using PLGP’s clean safe secure protocol.
Authors and Affiliations
V. Prudhvi Sai , G. Rama Koteswara rao , V. Radhe Shyam
K-Medoid Clustering Shows Negative Impact In Missing Data Imputation
Missing Data Imputation imputes the missing values from the known values. Rather than imputing from the whole dataset, imputation techniques are applied in the clusters generated by using clustering algorithm. In this...
The Image Analysis In Web Facial Images For Pursuit Face Annotation
Face annotation means giving the name to the picture which is in the photo. Auto face annotation is assuming pressing part in numerous true applications, for example, genuine administration frameworks and sight and s...
Cloud Computing: Security Threats and Counter Measures
Cloud computing is internet based computing whereby shared resources, software and information, is provided to computers and devices on-demand, like the electricity grid. It is a great idea to make many normal compute...
Automated Leukemia Detection using Contour Signature in Blood Microscopic Images
Out of four major types of leukemia acute lymphoblastic leukemia (ALL) is most common blood disorder in children’s of age ranging from 1-9 years. With lymphoblastic leukemia cancerous change begins in marrow cell whe...
Pulse Triggered Flip-Flop Design With Conditional Pulse Enhancement
In this paper a new technique is proposed based on the comparison between Conventional Transistorized Flip-flop and Data transition Look ahead D flip flop here we are checking the working of CDMFF and the conventiona...