Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

Detection and Prevention of Energy Draining Attack with Reduced Overhead

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computer Science and Information Technology
© 2016 by IJCA Journal
NCRTCSIT 2016 - Number 1
Year of Publication: 2016
Authors:
Mrunal Arjunkar
Ashish S. Sambare

Mrunal Arjunkar and Ashish S Sambare. Article: Detection and Prevention of Energy Draining Attack with Reduced Overhead. IJCA Proceedings on National Conference on Recent Trends in Computer Science and Information Technology NCRTCSIT 2016(1):12-16, June 2016. Full text available. BibTeX

@article{key:article,
	author = {Mrunal Arjunkar and Ashish S. Sambare},
	title = {Article: Detection and Prevention of Energy Draining Attack with Reduced Overhead},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computer Science and Information Technology},
	year = {2016},
	volume = {NCRTCSIT 2016},
	number = {1},
	pages = {12-16},
	month = {June},
	note = {Full text available}
}

Abstract

Survivability of network is its ability of being connected even below failures and attacks. Activity procedure of a device network at intervals the hostile setting leads it to battery drain attacks, because it isn't gettable to recharge and even replace device node's battery power. The motivation provided for the analysis efforts has been given by an inspiration maximization of network quantity, wherever the number of network is live of the moment of activity to the aim. Once any of the nodes has exhausted its restricted power provide and becomes in-operational normally referred as 1st node failure. Even a very distinctive approach for routing protocols, have an effect on from attacks those unit designed to be protected, unit unable to provide protection from these attacks, that decision vampire attacks. This might be a class of resource intense attacks that for good disable the entire network by quickly enfeebling battery of nodes. These attacks don't seem to be specific to any specific routing protocol, unit serious, powerful to look out and unit very easy to hold out victimization as few reciprocally malicious government inflicting solely protocol compliant messages throughout this novel approach, each phases of protocol unit thought of avoid attack or tolerate the attack. Here rule overhead is reduced and discovery section is taken into consideration to avoid vampire attack.

References

  • Eugene Y. Vasserman, Nicholas Hopper," Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks", IEEE transactions on mobile computing, VOL. 12, NO. 2, February 2013.
  • Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004.
  • Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006.
  • Vern Paxson, An analysis of using reflectors for distributed denial-of-service attacks, SIGCOMM Comput. Commun. Rev. 31 (2001), no. 3.
  • Kihong Park and Heejo Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, INFOCOM, 2001.
  • J. Deng, R. Han, and S. Mishra, "Defending against Path-Based DoS Attacks in Wireless Sensor Networks," Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, 2005.
  • J. H. Chang and L. Tassiulas, "Maximum Lifetime Routing in Wireless Sensor Networks," IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 609-619, Aug. 2004.
  • L. M. Feeney, "An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 6, no. 3, pp. 239-249, 2001.
  • Volkan Rodoplu and Teresa H. Meng, "Minimum energy mobile wireless networks", IEEE Journal on Selected Areas in Communications 17 (1999), no. 8.
  • Amitabh Saxena and Ben Soh, One-way signature chaining: a new paradigm for group cryptosystems, International Journal of Information and Computer Security 2 (2008), no. 3.
  • David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, "Effects of denial-of-sleep attacks on wireless sensor network MAC protocols", IEEE Transactions on Vehicular Technology 58 (2009),no. 1.
  • David R. Raymond and Scott F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses", IEEE Pervasive Computing 7 (2008), no. 1.