CFP last date
21 October 2024
Reseach Article

Detection and Prevention of Energy Draining Attack with Reduced Overhead

Published on June 2016 by Mrunal Arjunkar, Ashish S. Sambare
National Conference on Recent Trends in Computer Science and Information Technology
Foundation of Computer Science USA
NCRTCSIT2016 - Number 1
June 2016
Authors: Mrunal Arjunkar, Ashish S. Sambare
d8a18ed7-d514-415d-8117-d7f66815dae8

Mrunal Arjunkar, Ashish S. Sambare . Detection and Prevention of Energy Draining Attack with Reduced Overhead. National Conference on Recent Trends in Computer Science and Information Technology. NCRTCSIT2016, 1 (June 2016), 12-16.

@article{
author = { Mrunal Arjunkar, Ashish S. Sambare },
title = { Detection and Prevention of Energy Draining Attack with Reduced Overhead },
journal = { National Conference on Recent Trends in Computer Science and Information Technology },
issue_date = { June 2016 },
volume = { NCRTCSIT2016 },
number = { 1 },
month = { June },
year = { 2016 },
issn = 0975-8887,
pages = { 12-16 },
numpages = 5,
url = { /proceedings/ncrtcsit2016/number1/25019-1643/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Science and Information Technology
%A Mrunal Arjunkar
%A Ashish S. Sambare
%T Detection and Prevention of Energy Draining Attack with Reduced Overhead
%J National Conference on Recent Trends in Computer Science and Information Technology
%@ 0975-8887
%V NCRTCSIT2016
%N 1
%P 12-16
%D 2016
%I International Journal of Computer Applications
Abstract

Survivability of network is its ability of being connected even below failures and attacks. Activity procedure of a device network at intervals the hostile setting leads it to battery drain attacks, because it isn't gettable to recharge and even replace device node's battery power. The motivation provided for the analysis efforts has been given by an inspiration maximization of network quantity, wherever the number of network is live of the moment of activity to the aim. Once any of the nodes has exhausted its restricted power provide and becomes in-operational normally referred as 1st node failure. Even a very distinctive approach for routing protocols, have an effect on from attacks those unit designed to be protected, unit unable to provide protection from these attacks, that decision vampire attacks. This might be a class of resource intense attacks that for good disable the entire network by quickly enfeebling battery of nodes. These attacks don't seem to be specific to any specific routing protocol, unit serious, powerful to look out and unit very easy to hold out victimization as few reciprocally malicious government inflicting solely protocol compliant messages throughout this novel approach, each phases of protocol unit thought of avoid attack or tolerate the attack. Here rule overhead is reduced and discovery section is taken into consideration to avoid vampire attack.

References
  1. Eugene Y. Vasserman, Nicholas Hopper," Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks", IEEE transactions on mobile computing, VOL. 12, NO. 2, February 2013.
  2. Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004.
  3. Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006.
  4. Vern Paxson, An analysis of using reflectors for distributed denial-of-service attacks, SIGCOMM Comput. Commun. Rev. 31 (2001), no. 3.
  5. Kihong Park and Heejo Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, INFOCOM, 2001.
  6. J. Deng, R. Han, and S. Mishra, "Defending against Path-Based DoS Attacks in Wireless Sensor Networks," Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, 2005.
  7. J. H. Chang and L. Tassiulas, "Maximum Lifetime Routing in Wireless Sensor Networks," IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 609-619, Aug. 2004.
  8. L. M. Feeney, "An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 6, no. 3, pp. 239-249, 2001.
  9. Volkan Rodoplu and Teresa H. Meng, "Minimum energy mobile wireless networks", IEEE Journal on Selected Areas in Communications 17 (1999), no. 8.
  10. Amitabh Saxena and Ben Soh, One-way signature chaining: a new paradigm for group cryptosystems, International Journal of Information and Computer Security 2 (2008), no. 3.
  11. David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, "Effects of denial-of-sleep attacks on wireless sensor network MAC protocols", IEEE Transactions on Vehicular Technology 58 (2009),no. 1.
  12. David R. Raymond and Scott F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses", IEEE Pervasive Computing 7 (2008), no. 1.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc Wireless Sensor Networks Routing Protocols Denial Of Service Attack Energy Consumption Vampire Attacks.