SlideShare a Scribd company logo
1 of 1
RESOLVING VAMPIRE ATTACK IN AD-HOC LOW-POWER
         WIRELESS NETWORKS USING IMPROVED PLGP



ABSTRACT:
  Ad-hoc low-power wireless networks are in research in both sensing and pervasive
  computing. Prior security work in this area has been focused on denial of communication.
  This paper explores resource depletion attacks at the routing protocol layer, which disables
  battery power. “Vampire” attack is not specific to any specific protocol as they are difficult
  to detect and devastating. We mitigate these types of attacks by improving an already
  existing protocol called PLGP.

More Related Content

What's hot

A secure scheme against power exhausting
A secure scheme against power exhaustingA secure scheme against power exhausting
A secure scheme against power exhaustingjpstudcorner
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titlesEcwayt
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Selva Raj
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyRumana Firdose
 
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...LogicMindtech Nologies
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titlesEcwayt
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksShaik Irfan
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksLogicMindtech Nologies
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...LogicMindtech Nologies
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEEGLOBALSOFTSTUDENTPROJECTS
 

What's hot (15)

A secure scheme against power exhausting
A secure scheme against power exhaustingA secure scheme against power exhausting
A secure scheme against power exhausting
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
2014 ieee java project titles
2014 ieee java project titles2014 ieee java project titles
2014 ieee java project titles
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptography
 
Ppt
PptPpt
Ppt
 
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
 
2014 ieee .net project titles
2014 ieee .net project titles2014 ieee .net project titles
2014 ieee .net project titles
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
55
5555
55
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
 
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...Energy efficient clustering scheme for prolonging the lifetime of wireless se...
Energy efficient clustering scheme for prolonging the lifetime of wireless se...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
 

Viewers also liked

Contenidos tema 9 lengua
Contenidos  tema 9 lenguaContenidos  tema 9 lengua
Contenidos tema 9 lenguacchh07
 
An17 g formation-aix-workload-partitions-installation-et-management
An17 g formation-aix-workload-partitions-installation-et-managementAn17 g formation-aix-workload-partitions-installation-et-management
An17 g formation-aix-workload-partitions-installation-et-managementCERTyou Formation
 
B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2
B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2
B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2CERTyou Formation
 
0 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v15
0 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v150 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v15
0 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v15CERTyou Formation
 
0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...
0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...
0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...CERTyou Formation
 
As5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lpar
As5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lparAs5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lpar
As5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lparCERTyou Formation
 
Andc formation-android-avance-inclure-du-c-avec-le-ndk
Andc formation-android-avance-inclure-du-c-avec-le-ndkAndc formation-android-avance-inclure-du-c-avec-le-ndk
Andc formation-android-avance-inclure-du-c-avec-le-ndkCERTyou Formation
 
An05 g formation-ameliorations-power8-et-aix
An05 g formation-ameliorations-power8-et-aixAn05 g formation-ameliorations-power8-et-aix
An05 g formation-ameliorations-power8-et-aixCERTyou Formation
 
0 g036g formation-la-typologie-avec-ibm-spss-statistics
0 g036g formation-la-typologie-avec-ibm-spss-statistics0 g036g formation-la-typologie-avec-ibm-spss-statistics
0 g036g formation-la-typologie-avec-ibm-spss-statisticsCERTyou Formation
 
Seeds of Hope story
Seeds of Hope storySeeds of Hope story
Seeds of Hope storyNur Sattar
 
B5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiques
B5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiquesB5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiques
B5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiquesCERTyou Formation
 

Viewers also liked (17)

Contenidos tema 9 lengua
Contenidos  tema 9 lenguaContenidos  tema 9 lengua
Contenidos tema 9 lengua
 
Windsor1
Windsor1Windsor1
Windsor1
 
An17 g formation-aix-workload-partitions-installation-et-management
An17 g formation-aix-workload-partitions-installation-et-managementAn17 g formation-aix-workload-partitions-installation-et-management
An17 g formation-aix-workload-partitions-installation-et-management
 
B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2
B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2
B5151 g formation-ibm-cognos-analysis-studio-analyze-data-v10-1-10-2
 
0 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v15
0 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v150 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v15
0 a0v4g formation-modeles-pour-cible-quantitative-avec-ibm-spss-modeler-v15
 
0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...
0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...
0 a044g formation-construction-de-typologie-et-modeles-d-association-avec-ibm...
 
As5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lpar
As5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lparAs5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lpar
As5 eg formation-powervm-on-ibm-i-implementing-virtualization-and-lpar
 
Andc formation-android-avance-inclure-du-c-avec-le-ndk
Andc formation-android-avance-inclure-du-c-avec-le-ndkAndc formation-android-avance-inclure-du-c-avec-le-ndk
Andc formation-android-avance-inclure-du-c-avec-le-ndk
 
An05 g formation-ameliorations-power8-et-aix
An05 g formation-ameliorations-power8-et-aixAn05 g formation-ameliorations-power8-et-aix
An05 g formation-ameliorations-power8-et-aix
 
0 g036g formation-la-typologie-avec-ibm-spss-statistics
0 g036g formation-la-typologie-avec-ibm-spss-statistics0 g036g formation-la-typologie-avec-ibm-spss-statistics
0 g036g formation-la-typologie-avec-ibm-spss-statistics
 
Seeds of Hope story
Seeds of Hope storySeeds of Hope story
Seeds of Hope story
 
Colin Purnell CV
Colin Purnell CVColin Purnell CV
Colin Purnell CV
 
B5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiques
B5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiquesB5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiques
B5263 g formation-ibm-cognos-cube-designer-concevoir-des-cubes-dynamiques
 
Ansib formation-ansible
Ansib formation-ansibleAnsib formation-ansible
Ansib formation-ansible
 
Abecedari animals
Abecedari animalsAbecedari animals
Abecedari animals
 
New Logo 2013
New Logo 2013New Logo 2013
New Logo 2013
 
Product info
Product infoProduct info
Product info
 

Resolving Vampire Attacks in Wireless Networks Using Improved PLGP

  • 1. RESOLVING VAMPIRE ATTACK IN AD-HOC LOW-POWER WIRELESS NETWORKS USING IMPROVED PLGP ABSTRACT: Ad-hoc low-power wireless networks are in research in both sensing and pervasive computing. Prior security work in this area has been focused on denial of communication. This paper explores resource depletion attacks at the routing protocol layer, which disables battery power. “Vampire” attack is not specific to any specific protocol as they are difficult to detect and devastating. We mitigate these types of attacks by improving an already existing protocol called PLGP.