Vampire attacks: Draining life from wireless ad-hoc sensor networks
In this proposed method the resources that attack at the routing protocol layer, that disable the networks by quickly draining nodes’ battery power are explored. These are termed as Vampire attack; these are not specified by any specific protocol. It was observed that the all protocols are prone to the Vampire attacks, which are, highly destructive, difficult to detect and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. A single Vampire can increase the energy that is used in the network by a factor of O (N), N are the numbers of nodes in the network. In this method various ways to mitigate these types of attack are consider, that includes new proof-of-concept protocol that can control the damage caused by the Vampires while the data packets are forwarded.
-
Technologies Covered
-
Related Keywords