1 AIT Asian Institute of Technology

Invasion discovery and prevention technique for vampire attack

AuthorAnitha, Mogili
Call NumberAIT RSPR no.ICT-19-01
Subject(s)Ad hoc networks (Computer networks)
Wireless sensor networks

NoteA research submitted in partial fulfillment of the requirements for the degree of Master of Engineering in Information and Communication Technologies, School of Engineering and Technology
PublisherAsian Institute of Technology
Series StatementResearch studies project report ; no. ICT-19-01
AbstractWireless ad-hoc sensor networks are the new milestones in pervasive computing research area. the primary focus of wireless sensor networks was on denial of communication ate certain control levels. The DoC is analyzed generally at medium access control levels. These are kind of resource draining or resource depletion attacks at routing protocol layer. These kinds of attacks can make nodes permanently disable by draining the battery power from nodes by sending a small packet which takes certainly long duration in processing and transmission. Thus, they are named “vampire attacks”. These are not specific in nature. They are reliable on properties of many routing protocols. We came to know that these kinds of attacks are very difficult to detect. They are also very easy to carry out. Our day-to-day functioning of organizations and people has become intolerable towards organization faults. These faults can overcome by wireless sensor networks. Lack of availability of such networks can result in productivity loss. Availability of these networks should satisfy desired requirements. It is a critical property to maintain consistency between availability and utilization. But, wireless ad-hoc networks are vulnerable to Dos attacks. Research in particular area has been updating day-to-day to enhance survivability of those networks. Existing architectures and advancements on attempting secure routing, in order to hide the path from discovery, but vampire attacks do not try to change the path from discovery, but vampire attacks do not try to change the path of the packet. They just drain the battery power source from a node. Consideration of routes which benefit the power efficiency is also inappropriate to think, because functionality of such attempts is based on the cooperative node behavior. So, we need to design a system which quantifies the performance of such protocols during an attack. Then only the modification of existing network protocol to withstand the damage caused from attacks during packet transmission is possible.
Year2019
Corresponding Series Added EntryAsian Institute of Technology. Research studies project report ; no. ICT-19-01
TypeResearch Study Project Report (RSPR)
SchoolSchool of Engineering and Technology (SET)
DepartmentDepartment of Information and Communications Technologies (DICT)
Academic Program/FoSInformation and Communication Technology (ICT)
Chairperson(s)Teerapat Sanguankotchakorn;
Examination Committee(s)Attaphongse Taparugssanagorn;Poompat Saengudomlert;
Scholarship Donor(s)Asian Institute of Technology Fellowship;
DegreeResearch Studies Project Report (M. Eng.) - Asian Institute of Technology, 2019


Usage Metrics
View Detail0
Read PDF0
Download PDF0