A Sensor Network Routing Protocol To Clear The Damage From Vampire Attacks During Packet Forwarding

G.Lakshmi Narayana, CH.Koteswara Rao

Abstract


A reason creates and transmits it to the next hop toward the destination which broadcast it additional until the destination is reached consuming resources not only at the source node but also at each node the message moves through. If we believe the growing energy of an entire network intensification attacks are forever credible given that an opponent can write and send messages which are practiced by each node along the message path. A Vampire attack is the symphony and transmission of a message that sources more power to be enthusiastic by the network than if an open node transmitted a message of the same size to the same destination although using different packet headers. We compute the influence of the attack by the ratio of network energy used in the compassionate case to the energy used in the malicious case i.e. the relation of network-wide power operation with malicious nodes present to energy process with only honest nodes when the number and size of packets sent remains steady. Safety from Vampire attacks involves that this ratio is Energy use by malicious nodes is not measured since they can forever unilaterally drainpipe their own batteries. However believe the procedure of routing a packet in any multihop network.


References


“The Network Simulator - ns-2,” http://www.isi.edu/nsnam/ns, 2012.

I. Aad, J.-P. Hubaux, and E.W. Knightly, “Denial of Service Resilience in Ad Hoc Networks,” Proc. ACM MobiCom, 2004.

G. Acs, L. Buttyan, and I. Vajda, “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1533-1546, Nov. 2006.

T. Aura, “Dos-Resistant Authentication with Client Puzzles,” Proc. Int’l Workshop Security Protocols, 2001.

J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” Proc. 12th Conf. USENIX Security, 2003.

D. Bernstein and P. Schwabe, “New AES Software Speed Records,” Proc. Ninth Int’l Conf. Cryptology in India: Progress in Cryptology (INDOCRYPT), 2008.

D.J. Bernstein, “Syn Cookies,” http://cr.yp.to/syncookies.html, 1996.

I.F. Blaked, G. Seroussi, and N.P. Smart, Elliptic Curves inCryptography, vol. 265. Cambridge Univ. , 1999.

J.W. Bos, D.A. Osvik, and D. Stefan, “Fast Implementations of AES on Various Platforms,” Cryptology ePrint Archive, Report 2009/ 501, http://eprint.iacr.org, 2009.

H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.

J.-H. Chang and L. Tassiulas, “Maximum Lifetime Routing in Wireless Sensor Networks,” IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 609-619, Aug. 2004.

T.H. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), IETF RFC 3626, 2003.

J. Deng, R. Han, and S. Mishra, “Defending against Path-Based DoS Attacks in Wireless Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, 2005.

J. Deng, R. Han, and S. Mishra, “INSENS: Intrusion-Tolerant Routing for Wireless Sensor Networks,” Computer Comm., vol. 29, no. 2, pp. 216-230, 2006.

S. Doshi, S. Bhandare, and T.X. Brown, “An On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network,” ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 6, no. 3, pp. 50-66, 2002. [16] J.R. Douceur, “The Sybil Attack,” Proc. Int’l Workshop Peer-to-Peer

Systems, 2002.

H. Eberle, A. Wander, N. Gura, C.-S. Sheueling, and V. Gupta, “Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors,” Proc. IEEE Int’l Conf’ Application- Specific Systems, Architecture Processors (ASAP), 2005.

T. English, M. Keller, K.L. Man, E. Popovici, M. Schellekens, and W. Marnane, “A Low-Power Pairing-Based Cryptographic Accelerator for Embedded Security Applications,” Proc. IEEE Int’l SOC Conf. , 2009.

L.M. Feeney, “An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 6, no. 3, pp. 239-249, 2001.

M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, “Strong Authentication for RFID Systems Using the AES Algorithm,” Proc. Int’l Workshop Cryptographic Hardware and Embedded Systems (CHES), 2004.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.