Mitigation of vampire attacks in wireless adhoc and sensor networks during packet forwarding phase
April 2015
Ghyanshyam Meena, Mrs Sankuntala Sharma

Metrics

  • Eye Icon 157 views
  • Download Icon 24 downloads
Metrics Icon 157 views  //  24 downloads
Abstract

Ad-hoc wireless networks are an exciting research direction in sensing and pervasive computing. Advance security work in this area has beenprimarily focused on denial of communication at the routing or medium access control levels. There is a common attack at routing protocol layer, i.e. resource depletion attack, which permanently disables networks by drastically draining nodes' battery power. These “Vampire” attacks are not similar to any specific protocol, but rather depend upon the properties of many popular classes of routing protocols like link state and DSR protocols. These vampire attacks are very difficult to detect, devastating and easy to carry out using as few as one Malicious insider sending only protocol compliant messages. For mitigation of these kinds of attacks, some methods are explained, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.

Full text
Show more arrow
 
More from this journal
Mathematical Hydraulic Models of One-Dimensional Unsteady Flow in Rivers
Comparison of Mechanical Properties of Austempered, Normalized and As-Weld Carbon Steel Weldment
🧐  Browse all from this journal

Metrics

  • Eye Icon 157 views
  • Download Icon 24 downloads
Metrics Icon 157 views  //  24 downloads