The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols

N Santoshi Lakshmi, M V.V.S.Narayana Murthy

Abstract


The consequence of Vampire attacks on link-state, distance-vector, source routing and geographic and beacon routing protocols as well as a logical ID-based sensor network routing protocol. Whereas this is by no means a comprehensive list of routing protocols which are susceptible to Vampire attacks we analysis the covered protocols as a significant subset of the routing solution space and stress that our attacks are probable to apply to other protocols. Assuming that packet giving out drains at least as much energy from the victims as from the attacker a incessantly recharging adversary can keep at least one node enduringly disabled at the cost of its own functionality. However recall that sending any packet automatically constitutes augmentation allowing few Vampires to attack many honest nodes. Dual-cycle networks with mandatory sleep and awake periods are evenly susceptible to Vampires during active duty as long as the Vampire’s cycle switching is in sync with other nodes. Vampire attacks may be damaged by using groups of nodes with staggered cycles only active-duty nodes are vulnerable while the Vampire is active nodes are safe while the Vampire sleeps. Though this security is only successful when duty cycle groups outnumber Vampires given that it only takes one Vampire per group to carry out the attack.


Keywords


Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks.

References


“The Network Simulator - ns-2,” http://www.isi.edu/nsnam/ns, 2012.

I. Aad, J.-P. Hubaux, and E.W. Knightly, “Denial of Service Resilience in Ad Hoc Networks,” Proc. ACM MobiCom, 2004.

G. Acs, L. Buttyan, and I. Vajda, “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1533-1546, Nov. 2006.

T. Aura, “Dos-Resistant Authentication with Client Puzzles,” Proc. Int’l Workshop Security Protocols, 2001.

J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. 12th Conf. USENIX Security, 2003.

D. Bernstein and P. Schwabe, “New AES Software Speed Records,” Proc. Ninth Int’l Conf. Cryptology in India: Progress in Cryptology (INDOCRYPT), 2008.

D.J. Bernstein, “Syn Cookies,” http://cr.yp.to/syncookies.html, 1996.

I.F. Blaked, G. Seroussi, and N.P. Smart, Elliptic Curves in Cryptography, vol. 265. Cambridge Univ. , 1999.

J.W. Bos, D.A. Osvik, and D. Stefan, “Fast Implementations of AES on Various Platforms,” Cryptology ePrint Archive, Report 2009/ 501, http://eprint.iacr.org, 2009.

H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.

J.-H. Chang and L. Tassiulas, “Maximum Lifetime Routing in Wireless Sensor Networks,” IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 609-619, Aug. 2004.

T.H. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), IETF RFC 3626, 2003.

J. Deng, R. Han, and S. Mishra, “Defending against Path-Based DoS Attacks in Wireless Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, 2005.

J. Deng, R. Han, and S. Mishra, “INSENS: Intrusion-Tolerant Routing for Wireless Sensor Networks,” Computer Comm., vol. 29, no. 2, pp. 216-230, 2006.

S. Doshi, S. Bhandare, and T.X. Brown, “An On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network,” ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 6, no. 3, pp. 50-66, 2002.

J.R. Douceur, “The Sybil Attack,” Proc. Int’l Workshop Peer-to-Peer Systems, 2002.

H. Eberle, A. Wander, N. Gura, C.-S. Sheueling, and V. Gupta, “Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors,” Proc. IEEE Int’l Conf’ Application- Specific Systems, Architecture Processors (ASAP), 2005.

T. English, M. Keller, K.L. Man, E. Popovici, M. Schellekens, and W. Marnane, “A Low-Power Pairing-Based Cryptographic Accelerator for Embedded Security Applications,” Proc. IEEE Int’l SOC Conf. , 2009.

L.M. Feeney, “An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 6, no. 3, pp. 239-249, 2001.

M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, “Strong Authentication for RFID Systems Using the AES Algorithm,” Proc. Int’l Workshop Cryptographic Hardware and Embedded Systems (CHES), 2004.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.