Vampire Attack: Energy Efficient Trust Based Solution
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)Publication Date: 2014-12-05
Authors : Pritam M. Channawar; Y. V.Chavan;
Page : 314-317
Keywords : Security; routing; ad hoc networks; medium access control; wireless networks;
Abstract
In sensing and common computing ad hoc low-power wireless networks are an exciting research direction. Earlier security scheme in this area has focused mainly on denial of communication at the routing or medium access control levels. This paper redefines resource depletion attacks at the routing protocol layer. This attack permanently disables networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but depend on the properties of many popular classes of routing protocols. We discussed all protocols are susceptible to Vampire attacks, which are dangerous, difficult to detect, and are very easy to carry out using very few such as one malicious insider sending only protocol-compliant messages. With this, a single Vampire can increase network-wide energy usage by a factor of O (N), here N in the number of network nodes in the network. Proposed algorithm finds the solution for carousal attack and stretch attack to achieve better security. Also trust based energy efficient technique is adopted to keep network active in vampire attack, it also help to detect and avoid malicious nodes in the routing phase.
Other Latest Articles
- Secure Server Verification by using Encryption Algorithm and Visual Cryptography
- The Role of Information Technology in the Business Sector
- Environmental Natural Gamma Radiation Level and Activity of Uranium-238, Thorium-232 at Different Places Measured Using NaI (Tl) Scintillation Detector
- Genetic Analysis of Cyto-sterile Lines in Rice (Oryza sativa L)
- An Opposition based Harmony Search Approach for Performance Improvement in Linear FIR Filter Design
Last modified: 2021-06-30 21:15:01