Open Access Open Access  Restricted Access Subscription Access

Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization


Affiliations
1 Computer Science and Engineering, MVGR College of Engineering, Andhra Pradesh, India
 

Low-power wireless networks are an exciting research direction in sensing and widespread figuring out/calculating. Prior security work in this area has focused mostly on denial of communication at the routing or medium access control levels. This paper explores useful thing/valuable supply using everything up (completely) attacks at the routing rules of conduct layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific rules of conduct, but rather depend on the properties of many popular classes of routing rules of conduct. We find that all examined rules of conduct are easily able to be harmed or influenced by Vampire attacks, which are terrible and destructive, very hard to detect, and are easy to carry out using as few as one evil and cruel insider sending only rules of conduct cooperative messages.

Keywords

Vampire Attacks, Draining Nodes, Stretch Attack, Ad-hoc Wireless Sensor Networks.
User
Notifications
Font Size

Abstract Views: 256

PDF Views: 2




  • Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization

Abstract Views: 256  |  PDF Views: 2

Authors

G. Sandhya Rani
Computer Science and Engineering, MVGR College of Engineering, Andhra Pradesh, India
P. Santosh Naidu
Computer Science and Engineering, MVGR College of Engineering, Andhra Pradesh, India

Abstract


Low-power wireless networks are an exciting research direction in sensing and widespread figuring out/calculating. Prior security work in this area has focused mostly on denial of communication at the routing or medium access control levels. This paper explores useful thing/valuable supply using everything up (completely) attacks at the routing rules of conduct layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific rules of conduct, but rather depend on the properties of many popular classes of routing rules of conduct. We find that all examined rules of conduct are easily able to be harmed or influenced by Vampire attacks, which are terrible and destructive, very hard to detect, and are easy to carry out using as few as one evil and cruel insider sending only rules of conduct cooperative messages.

Keywords


Vampire Attacks, Draining Nodes, Stretch Attack, Ad-hoc Wireless Sensor Networks.