VAMPIRE ATTACK DRAINING LIFE FROM WIRELESS AD-HOC-SENSORS NETWORK

Authors

  • Pooja M Author

DOI:

https://doie.org/10.5281/742j9j28

Keywords:

Block chain, Security, block size, hash code,,

Abstract

Exciting applications for future technology that may operate safely in wireless ad 
hoc networks include ubiquitous on-demand processing capacity, continuous connection, and 
instantaneously deployable communication for the military and first responders. These are just 
some of the applications that are on the horizon. The operation of wireless networks is based 
on a fundamental mechanism that involves direction in sensing and ubiquitous computing. 
Wireless ad hoc networks are especially susceptible to denial of service (DoS) attacks; thus, a 
significant amount of research has been conducted to improve their capacity to survive such 
assaults. Prior security work in this area has generally concentrated on denying communication 
at the routing or medium access control levels as the primary target for protection. We look at 
how routing protocols, even ones that are meant to be safe, do not provide any protection 
against these assaults, which we name "Vampire attacks" since they siphon power from the 
nodes that make up a network. These so-called "Vampire" attacks are not limited to a single 
protocol, but rather depend on the characteristics that are shared by a variety of widely used 
categories of routing protocols. We have come to the conclusion that every single one of the 
protocols that were investigated is vulnerable to Vampire assaults. These attacks are 
destructive, difficult to detect, and simple to execute with as little as a single hostile insider 
sending only protocol-compliant communications. This study introduces a novel proof-of
concept protocol that provably confines the harm produced by Vampires during the packet 
forwarding phase. The introduction of this protocol is part of the mitigation of these sorts of 
attacks.

,

References

Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, "Imad Aad, Jean-Pierre Hubaux,

and Edward W. Knightly," MobiCom, 2004 study on the robustness of ad hoc networks against

denial of service attacks.

Gergely Acs, Levente Buttyan, and Istvan Vajda, in Gergely Acs, et al., Provably safe on

demand source routing in mobile ad hoc networks, IEEE Transactions on Mobile Computing

(2006), no. 11 [Provably secure on-demand source routing in mobile ad hoc networks].

Tuomas Aura, "Dos-resistant authentication with client puzzles," presented at the

International workshop on security protocols in the year 2001.

Haowen Chan and Adrian Perrig, "Security and privacy in sensor networks," Computer 36,

issue 10 (2003).

Jae-Hwan Chang and Leandros Tassiulas, in Jae-Hwan Chang and Leandros Tassiulas,

Maximum lifetime routing in wireless sensor networks, IEEE/ACM Transactions on

Networking 12 (2004), no. 4 [Maximum lifetime routing in wireless sensor networks].

Jing Deng, Richard Han, and Shivakant Mishra, Defending against path-based Denial of

Service Attacks in Wireless Sensor Networks, presented at the ACM Workshop on the Security

of Ad Hoc and Sensor Networks in 2005.

INSENS: Intrusion-tolerant routing for wireless sensor networks, published in Computer

Communications 29 (2006), number 2.

Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, and Jennifer Rexford, Path

quality monitoring in the presence of adversaries, published in SIG-METRICS in the year

Andrea J. Goldsmith and Stephen B. Wicker, "Design challenges for energy-constrained ad

hoc wireless networks," published in IEEE Wireless Communications, vol. 9, issue 4, in 2002.

Reduction of quality (RoQ) attacks on Internet end-systems, written by Mina Guirguis,

Azer Bestavros, Ibrahim Matta, and Yuting Zhang, published in INFOCOM in 2005.

Packet leashes: A Defense Against Wormhole Attacks on Wireless Ad Hoc Networks,

INFOCOM, 2003. [This] article was published in 2003.

Timothy J. McNevin, Jung-Min Park, and Randolph Marchany, "pTCP: A Client Puzzle

Protocol for Defending Against Resource Exhaustion Denial of Service Attacks," Technical

Report TR-ECE-04-10, Department of Electrical and Computer Engineering, Virginia Tech,

[Citation needed] pTCP: A Client Puzzle Protocol for Defending Against Resource

Exhaustion Denial of Service Attacks.

Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig are the authors. A clean slate

method to secure sensor network routing, published at CoNEXT in 2006.

David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff,

"Effects of denial-of-sleep attacks on wireless sensor network MAC protocols," IEEE

Transactions on Vehicular Technology 58 (2009), no. 1; Effects of denial-of-sleep attacks on

wireless sensor network MAC protocols.

Denial-of-service in wireless sensor networks: Attacks and countermeasures, IEEE

Pervasive Computing 7 (2008), no. 1. David R. Raymond and Scott F. Midkiff.

The reviving duckling: security concerns for ad-hoc wireless networks was presented at

the International workshop on security protocols in 1999 by Frank Stajano and Ross Anderson.

Anthony D. Wood and John A. Stankovic, "Denial of service in sensor networks,"

Computer 35, no. 10 (2002, September).

Manel Guerrero Zapata and N. Asokan, Securing Ad Hoc Routing Protocols, published in

WiSE in the year 2002.

Downloads.

Published

2023-02-21

Issue

Section

Articles

How to Cite

VAMPIRE ATTACK DRAINING LIFE FROM WIRELESS AD-HOC-SENSORS NETWORK . (2023). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 1(2), 70-76. https://doi.org/10.5281/742j9j28