All | Since 2020 | |
Citation | 172 | 110 |
h-index | 7 | 5 |
i10-index | 1 | 0 |
WJERT Citation 
Login
News & Updation
Abstract
VAMPIRE BITES HINDER WIRELESS AD HOC SENSOR NETWORKS
*Dr. Selvi M. and Dr. R. Balakrishna
ABSTRACT
New research in areas like sensing and pervasive computing focuses on wireless networks with no administrative requirements. Security researchers previously focused mostly on cutting down connectivity by controlling routing or MAC layers. The study looks at how resource depletion attacks at the routing protocol layer can rapidly drain node battery power, making networks useless. Many major routing protocols suffer from "Vampire" assaults. These attacks include a variety of components and can affect many routing protocols. We've learned that Vampire attacks, which are powerful, hard to detect, and simple to execute with just one bad actor providing protocol-compliant messages, are capable of devastating all of the protocols that we're looking at. A single Vampire can single-handedly wreck network-wide energy usage by an order of magnitude, where N is the number of nodes in the network. In this paper, we will detail a new protocol for the forwarding phase of a Vampire- type network device that is capable of proving its limits.
[Full Text Article] [Download Certificate]