EFFICIENT DETECTION AND ELIMINATION OF VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 2, Issue 2, No 1, 2014.

Copyright: All Rights Reserved ©2014

Year of Publication: 2014

Author: RAMYA.D

Reference:IJCS-055

View PDF Format

Abstract

The wireless adhoc sensor network and routing data is vulnerable to certain attacks. So ensure a secure and authenticated data transmission process. There are a lot of protocols developed to protect from DOS attack, but it is not completely possible. One such DOS attack is Vampire attack draining of node life from wireless adhoc sensor networks. It explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. The methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by vampires during the packet forwarding phase. An proposed project concentrates on securing the network from the malicious attack. The implementation results in the efficient detection and elimination of vampire attack from the network. In order to detect and eliminating the vampire attack are going to implement certain intrusion detection system based on the energy level constraints. The simulation result shows the improved network authentication rate and efficient detection of malicious node from the network, so that proposed system forms a secure network with high throughput rate.

References

[1] Acs .G, Buttyan. L, and Vajda .I, (2006). ‘Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks’. [2] Aad.I, Hubaux J.P, and Knightly E.W, (2004) ‘Denial of Service Resilience in Ad Hoc Networks,’Proc. ACM MobiCom..Bos J.W, Osvik D.A, and Stefan.D (2009). ‘Fast Implementations of [3] AES Various Platforms’ Cryptology ePrint Archive, Report 2009/ 501, http://eprint.iacr.org.[4] Deng.J, Han.R, and Mishra.S, (2005) ‘Defending against Path-Based DoS Attacks in Wireless Sensor Networks,’ Proc. ACM Workshop Security of Ad Hoc and Sensor Networks [5] Deng.J, Han.R, and. Mishra.S, (2006). ‘INSENS: Intrusion-Tolerant Routing for Wireless Sensor Networks,’Computer Comm. [6] Doshi.S, Bhandare.S, and. Brown T.X, (2006) ‘An On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network,’ACM SIGMOBILE Mobile Computing and Comm. Rev.Fonseca.R, Ratnasamy.S, Zhao.J, C.T. Ee, Culler.D, (2005). ‘BeaconVectorScalable Point-to-Point Routing in Wireless Sensornets’.


Keywords

Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog