ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

PREVENTION OF VAMPIRE ATTACKS TO CONTROL ROUTING BEHAVIOR IN WIRELESS AD HOC SENSOR NETWORKS?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 6)

Publication Date:

Authors : ; ;

Page : 388-392

Keywords : Network; Protocol; Packet; Vampire attack;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

An Ad hoc wireless sensor networks (WSNs) assuring many new exciting applications such as On-demand computing supremacy, incessant connectivity, and instantaneously deployable communication for armed and responders. As WSNs grow to be a greater extent essential to the everyday performance of people and organizations, many attacks are arisen in the Ad hoc wireless sensor networks. This project explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. In the worst case, a single vampire can increase network-wide energy usage by a factor of O (N), where N is the number of network nodes. This project proposes methods to prevent the adversary influence on the network, including an implemented PLGPa method of AODV protocol that provably bounds the damage caused by vampires during the packet forwarding phase.

Last modified: 2014-06-24 00:15:27