1
Invasion discovery and prevention technique for vampire attack | |
Author | Anitha, Mogili |
Call Number | AIT RSPR no.ICT-19-01 |
Subject(s) | Ad hoc networks (Computer networks) Wireless sensor networks |
Note | A research submitted in partial fulfillment of the requirements for the degree of Master of Engineering in Information and Communication Technologies, School of Engineering and Technology |
Publisher | Asian Institute of Technology |
Series Statement | Research studies project report ; no. ICT-19-01 |
Abstract | Wireless ad-hoc sensor networks are the new milestones in pervasive computing research area. the primary focus of wireless sensor networks was on denial of communication ate certain control levels. The DoC is analyzed generally at medium access control levels. These are kind of resource draining or resource depletion attacks at routing protocol layer. These kinds of attacks can make nodes permanently disable by draining the battery power from nodes by sending a small packet which takes certainly long duration in processing and transmission. Thus, they are named “vampire attacks”. These are not specific in nature. They are reliable on properties of many routing protocols. We came to know that these kinds of attacks are very difficult to detect. They are also very easy to carry out. Our day-to-day functioning of organizations and people has become intolerable towards organization faults. These faults can overcome by wireless sensor networks. Lack of availability of such networks can result in productivity loss. Availability of these networks should satisfy desired requirements. It is a critical property to maintain consistency between availability and utilization. But, wireless ad-hoc networks are vulnerable to Dos attacks. Research in particular area has been updating day-to-day to enhance survivability of those networks. Existing architectures and advancements on attempting secure routing, in order to hide the path from discovery, but vampire attacks do not try to change the path from discovery, but vampire attacks do not try to change the path of the packet. They just drain the battery power source from a node. Consideration of routes which benefit the power efficiency is also inappropriate to think, because functionality of such attempts is based on the cooperative node behavior. So, we need to design a system which quantifies the performance of such protocols during an attack. Then only the modification of existing network protocol to withstand the damage caused from attacks during packet transmission is possible. |
Year | 2019 |
Corresponding Series Added Entry | Asian Institute of Technology. Research studies project report ; no. ICT-19-01 |
Type | Research Study Project Report (RSPR) |
School | School of Engineering and Technology (SET) |
Department | Department of Information and Communications Technologies (DICT) |
Academic Program/FoS | Information and Communication Technology (ICT) |
Chairperson(s) | Teerapat Sanguankotchakorn; |
Examination Committee(s) | Attaphongse Taparugssanagorn;Poompat Saengudomlert; |
Scholarship Donor(s) | Asian Institute of Technology Fellowship; |
Degree | Research Studies Project Report (M. Eng.) - Asian Institute of Technology, 2019 |