VAMPIRE ATTACK DRAINING LIFE FROM WIRELESS AD-HOC-SENSORS NETWORK
DOI:
https://doie.org/10.5281/742j9j28Keywords:
Block chain, Security, block size, hash code,,Abstract
Exciting applications for future technology that may operate safely in wireless ad
hoc networks include ubiquitous on-demand processing capacity, continuous connection, and
instantaneously deployable communication for the military and first responders. These are just
some of the applications that are on the horizon. The operation of wireless networks is based
on a fundamental mechanism that involves direction in sensing and ubiquitous computing.
Wireless ad hoc networks are especially susceptible to denial of service (DoS) attacks; thus, a
significant amount of research has been conducted to improve their capacity to survive such
assaults. Prior security work in this area has generally concentrated on denying communication
at the routing or medium access control levels as the primary target for protection. We look at
how routing protocols, even ones that are meant to be safe, do not provide any protection
against these assaults, which we name "Vampire attacks" since they siphon power from the
nodes that make up a network. These so-called "Vampire" attacks are not limited to a single
protocol, but rather depend on the characteristics that are shared by a variety of widely used
categories of routing protocols. We have come to the conclusion that every single one of the
protocols that were investigated is vulnerable to Vampire assaults. These attacks are
destructive, difficult to detect, and simple to execute with as little as a single hostile insider
sending only protocol-compliant communications. This study introduces a novel proof-of
concept protocol that provably confines the harm produced by Vampires during the packet
forwarding phase. The introduction of this protocol is part of the mitigation of these sorts of
attacks.
References
Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, "Imad Aad, Jean-Pierre Hubaux,
and Edward W. Knightly," MobiCom, 2004 study on the robustness of ad hoc networks against
denial of service attacks.
Gergely Acs, Levente Buttyan, and Istvan Vajda, in Gergely Acs, et al., Provably safe on
demand source routing in mobile ad hoc networks, IEEE Transactions on Mobile Computing
(2006), no. 11 [Provably secure on-demand source routing in mobile ad hoc networks].
Tuomas Aura, "Dos-resistant authentication with client puzzles," presented at the
International workshop on security protocols in the year 2001.
Haowen Chan and Adrian Perrig, "Security and privacy in sensor networks," Computer 36,
issue 10 (2003).
Jae-Hwan Chang and Leandros Tassiulas, in Jae-Hwan Chang and Leandros Tassiulas,
Maximum lifetime routing in wireless sensor networks, IEEE/ACM Transactions on
Networking 12 (2004), no. 4 [Maximum lifetime routing in wireless sensor networks].
Jing Deng, Richard Han, and Shivakant Mishra, Defending against path-based Denial of
Service Attacks in Wireless Sensor Networks, presented at the ACM Workshop on the Security
of Ad Hoc and Sensor Networks in 2005.
INSENS: Intrusion-tolerant routing for wireless sensor networks, published in Computer
Communications 29 (2006), number 2.
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, and Jennifer Rexford, Path
quality monitoring in the presence of adversaries, published in SIG-METRICS in the year
Andrea J. Goldsmith and Stephen B. Wicker, "Design challenges for energy-constrained ad
hoc wireless networks," published in IEEE Wireless Communications, vol. 9, issue 4, in 2002.
Reduction of quality (RoQ) attacks on Internet end-systems, written by Mina Guirguis,
Azer Bestavros, Ibrahim Matta, and Yuting Zhang, published in INFOCOM in 2005.
Packet leashes: A Defense Against Wormhole Attacks on Wireless Ad Hoc Networks,
INFOCOM, 2003. [This] article was published in 2003.
Timothy J. McNevin, Jung-Min Park, and Randolph Marchany, "pTCP: A Client Puzzle
Protocol for Defending Against Resource Exhaustion Denial of Service Attacks," Technical
Report TR-ECE-04-10, Department of Electrical and Computer Engineering, Virginia Tech,
[Citation needed] pTCP: A Client Puzzle Protocol for Defending Against Resource
Exhaustion Denial of Service Attacks.
Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig are the authors. A clean slate
method to secure sensor network routing, published at CoNEXT in 2006.
David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff,
"Effects of denial-of-sleep attacks on wireless sensor network MAC protocols," IEEE
Transactions on Vehicular Technology 58 (2009), no. 1; Effects of denial-of-sleep attacks on
wireless sensor network MAC protocols.
Denial-of-service in wireless sensor networks: Attacks and countermeasures, IEEE
Pervasive Computing 7 (2008), no. 1. David R. Raymond and Scott F. Midkiff.
The reviving duckling: security concerns for ad-hoc wireless networks was presented at
the International workshop on security protocols in 1999 by Frank Stajano and Ross Anderson.
Anthony D. Wood and John A. Stankovic, "Denial of service in sensor networks,"
Computer 35, no. 10 (2002, September).
Manel Guerrero Zapata and N. Asokan, Securing Ad Hoc Routing Protocols, published in
WiSE in the year 2002.