VAMPIRE ATTACKS: PROTOCOL ROUTING INFRASTRUCTURE IN WIRELESS SENSOR NETWORKSJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)
Publication Date: 2014-02-28
Authors : T.Nivethitha S.Muthukrishnan S. Navaneethakrishnan;
Page : 328-336
Keywords : WSN; Routing; malicious adversaries; lamia attacks;
Ad hoc low-power wireless networks square measure an exciting analysis direction in sensing and pervasive computing. Previous security work in this space has targeted totally on denial of communication at the routing or medium access management levels. It explores resource depletion attacks at the routing protocol layer that for good disable networks by quickly exhausting nodes battery power. These “Vampire” attacks don't seem to be specific to any specific protocol, however rather trust the properties of the many standard categories of routing protocols. We discover that each one examined protocols square measure liable to lamia attacks, that square measure devastating, troublesome to observe, and are easy to hold out victimization as few in concert malicious business executive causation solely protocol-compliant messages. We have a tendency to discuss ways to mitigate these styles of attacks, as well as a brand new proof-of-concept protocol that incontrovertibly bounds the injury caused by Vampires during the packet forwarding section.
Other Latest Articles
- FINITE?PRECISION ANALYSIS OF DEMAPPERS AND DECODERS FOR LDPC-CODED M-QAM SYSTEMS?
- Copyright Protection through Deep Packet Inspection- An Indian Perspective
- VLSI Architecture for Implementing Kaiser Bessel Window Function Using Expanded Hyperbolic CORDIC Algorithm?
- Analysis of Lossy Hyperspectral Image Compression Techniques?
- Book Review: Science Education for Gifted Students (Susan K. Johnsen, James Kendrick)
Last modified: 2014-02-20 13:16:23