SlideShare a Scribd company logo
1 of 7
Download to read offline
Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07
www.ijera.com 1 | P a g e
Detection and Control of Vampire Attacks in Ad-Hoc Wireless
Networks
Anoopa S1
, Sudha S K2
M. Tech Scholar, Department of Computer Science & Engineering, Sarabhai Institute of science and
Technology, Vellanadu, Trivandrum, India
Associate Professor, Department of Computer Science & Engineering, Sarabhai Institute of science and
Technology, Vellanadu, Trivandrum, India
Abstract
Ad-hoc low-power wireless networks are the most promising research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of service at the routing or medium
access control levels. Earlier, the resource depletion attacks are considered only as a routing problem, very
recently these are classified in to a new group called “vampire attacks”. This thesis work explores the
identification of resource depletion attacks at the routing protocol layer and in the application layer, which
permanently disable networks by quickly draining nodes’ battery power. These Vampire attacks are not specific
to a particular protocol, but rather rely on the properties of many popular classes of routing protocols. It is clear
that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are
easy to carry out using as few as one malicious insider sending only protocol compliant messages. In the worst
case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of
network nodes. In this work a detection and control strategy is proposed for these vampire attacks, along with a
secure packet forwarding mechanism, which will save Ad-hoc wireless nodes from power drainage due to
vampire packets.
Keywords: Vampire attack, Wireless Ad-Hoc network power drainage, PLGPa etc.
I. INTRODUCTION
A .Background Ad-hoc mode is a method for
wireless devices to directly communicate with each
other. Operating in ad-hoc mode allows all wireless
devices within range of each other to discover and
communicate in peer-to-peer fashion without
involving central access points. A wireless ad hoc
network is a decentralized type of wireless network.
The network is Ad-hoc because it does not rely on a
pre existing infrastructure, such as routers in wired
networks or access points in managed (infrastructure)
wireless networks. Instead, each node participates in
routing by forwarding data for other nodes, so the
determination of which nodes forward data is made
dynamically on the basis of network connectivity. An
Ad-hoc network tends to feature a small group of
devices all in very close proximity to each other.
Performance suffers as the number of devices grows,
and a large Ad-hoc network quickly becomes
difficult to manage. Ad-hoc networks cannot bridge
to wired LANs or to the Internet without installing a
special-purpose gateway. In addition to the classic
routing, Ad- hoc networks can use flooding for
forwarding data.
An Ad-hoc network typically refers to any
set of networks where all devices have equal status
on a network and are free to associate with any other
Ad-hoc network device in link range. Ad hoc
network often refers to a mode of operation of IEEE
802.11 wireless networks. It also refers to a network
device's ability to maintain link status information for
any number of devices in a 1-link (“hop") range, and
thus, this is most often a Layer 2 activity. Because
this is only a Layer 2 activity, ad hoc networks alone
may not support a routable IP network environment
without additional Layer 2 or Layer 3 capabilities.
Minimal configuration and quick deployment make
ad hoc networks suitable for emergency situations
like natural disasters or military conflicts. The
presence of dynamic and adaptive routing protocols
enables ad hoc networks to be formed quickly.
Wireless ad hoc networks can be further classified by
their application.
A mobile ad-hoc network (MANET) is a
self-configuring infrastructure less network of mobile
devices connected by wireless. Ad hoc is Latin and
means "for this purpose”. Each device in a MANET
is free to move independently in any direction, and
will therefore change its links to other devices
frequently. Each must forward traffic unrelated to its
own use, and therefore be a router. The primary
challenge in building a MANET is equipping each
device to continuously maintain the information
required to properly route traffic.
RESEARCH ARTICLE OPEN ACCESS
Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07
www.ijera.com 2 | P a g e
Fig 1.1: Wireless adhoc network
.
A mobile ad hoc network has attracted a lot
of attention due to the popularity of mobile devices
and the advances in wireless communication
technologies. A MANET is a peer-to-peer multihop
mobile wireless network that has neither a fixed
infrastructure nor a central server. Each node in a
MANET acts as a router, and communicates with
each other.
A large variety of MANET applications
have been developed. For example, a MANET can be
used in special situations, where installing
infrastructure may be difficult, or even infeasible,
such as a battlefield or a disaster area. A mobile peer-
to-peer file sharing system is another interesting
MANET application.
MANETs are a kind of wireless ad hoc
networks that usually has a routable networking
environment on top of a Link Layer ad hoc network.
The growth of laptops and 802.11/Wi-Fi wireless
networking has made MANETs a popular research
topic since the mid 1990s. Different protocols are
then evaluated based on measure such as the packet
drop rate, the overhead introduced by the routing
protocol, end-to-end packet delays, network
throughput etc.
Characteristics-A wireless ad-hoc network is a
collection of mobile devices equipped with a
transmitter and receiver, connected in the absence of
fixed infrastructure. Wireless ad-hoc network is
defined with characteristics such as purpose-specific,
autonomous and dynamic. In comparison with fixed
wireless networks, there is no master slave
relationship that exists in a wireless ad-hoc network.
Nodes rely on each other to established
communication, thus each node acts as a router.
Therefore, in a wireless ad-hoc network, a packet can
travel from a source to a destination either directly, or
through some set of intermediate packet forwarding
nodes.
The control and management of wireless ad-
hoc network is distributed among the participating
nodes. Each node is responsible to forward packet to
other nodes in the networks. The nodes are also
collaborate themselves to implement network routine
functions such as security
The major characteristics of wireless adhoc networks
are:
Power consumption constrains for nodes
using batteries, Ability to cope with node failures,
Mobility of nodes, Dynamic network topology,
Communication failures, Ability to withstand
complex environmental conditions, Ease of use,
Deeply distributed architecture.
B. Problem Objective
The objective of this paper is to create a
secure mechanism which detects the vampire packets
and prevents the forwarding of vampire packets and
the formation of such type of packet inside the node.
C. Problem Motivation
The life of the wireless adhoc network,
especially that of sensor network depends on its
node’s battery power. In most of the applications,
battery recharging or replacing is impossible. Power
drainage will leads to the failure of the node and it
will affect the network also. Data loss will also occur.
Therefore an efficient energy utilization scheme is
required, that is, data packets should be transmitted
by using minimum units of energy. But some
malicious packets called vampire packets may
consume more energy for packet forwarding than that
of honest packet forwarding .This will lead to power
drainage of node and network failure. If we can find
and avoid these type of vampire packets, then we can
increase the life of the node and thereby the network.
It will be very crucial in many of the situations and
will increase the wide acceptability of adhoc wireless
networks in many important applications.
D. Literature Review
Eugene Y. Vasserman and Nicholas Hopper
[1] introduced a definition for vampire attacks in
february 2013. Vampire attacks are clearly defined in
their study. The study makes three primary
contributions. First evaluates the vulnerabilities of
existing protocols to routing layer battery depletion
attacks. The security measures to prevent Vampire
attacks are orthogonal to those used to protect routing
infrastructure, and so existing secure routing
protocols such as Ariadne, SAODV, and SEAD do
not protect against Vampire attacks. Existing work on
secure routing attempts to ensure that adversaries
cannot cause path discovery to return an invalid
network path, but Vampires do not disrupt or alter
discovered paths, instead using existing valid
Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07
www.ijera.com 3 | P a g e
network paths and protocol compliant messages. The
authors proposed defenses against some of the
forwarding-phase attacks and described PLGPa, the
first sensor network routing protocol that provably
bounds damage from Vampire attacks by verifying
that packets consistently make progress toward their
destinations. They have not offered a fully
satisfactory solution for Vampire attacks during the
topology discovery phase, but suggested some
intuition about damage limitations possible with
further modifications to PLGPa. They concentrated
only in the network layer but not considered about
the application layer where the malicious packet
actually originates. Gergely Acs, Levente Buttyan,
and Istvan Vajda [5] had introduced a new attack on
Ariadne, a previously published “secure” routing
protocol. These attacks clearly demonstrate that flaws
can be very subtle, and therefore, hard to discover by
informal reasoning. Hence, they advocate a more
systematic approach to analyzing ad hoc routing
protocols, which is based on a rigorous mathematical
model, in which precise definitions of security can be
given, and sound proof techniques can be developed.
Imad Aad, Jean-Pierre Hubaux, and Edward W.
Knightly[4], mainly focuses on the design and study
DoS attacks in order to assess the damage that
difficult-to-detect attackers can cause. The authors
presented a novel DoS attack perpetrated by
JellyFish: relay nodes that stealthily disorder, delay,
or periodically drop packets that they are expected to
forward, in a way that leads astray end-to-end
congestion control protocols. This attack is protocol-
compliant and yet has a devastating impact on the
throughput of closed-loop flows, such as TCP flows
and congestion-controlled UDP flows. For
completeness, they have also considered a well
known attack, the Black Hole attack, as its impact on
open-loop flows is similar to the effect of JellyFish
on closed-loop flows.they studied these attacks in a
variety of settings and have provided a quantification
of the damage they can inflict. It is showed that, such
attacks can actually increase the capacity of ad hoc
networks as they will starve all multihop flows and
provide all resources to one-hop flows that cannot be
intercepted by JellyFish or Black Holes.
Bryan Parno, Mark Luk, Evan Gaustad, and
Adrian Perrig [2] introduce a secure routing protocol
for Ad-hoc wireless networks. The deployment of
sensor networks in security-and safety-critical
environments requires secure communication
primitives. In this study, the authors design,
implement, and evaluate a new secure routing
protocol for sensor networks. The protocol presented
in this paper requires no special hardware and
provides message delivery even in an environment
with active adversaries. They adopt a clean-slate
approach and design a new sensor network routing
protocol with security and efficiency as central
design parameters. The protocol is efficient yet
highly resilient to active attacks.
An article of computer communications [3] ,
29(2006),no 2, describes an INtrusion-tolerant
routing protocol for wireless SEnsor NetworkS
(INSENS). INSENS constructs forwarding tables at
each node to facilitate communication between
sensor nodes and a base station. It minimizes
computation, communication, storage, and bandwidth
requirements at the sensor nodes at the expense of
increased computation, communication, storage, and
bandwidth requirements at the base station. INSENS
does not rely on detecting intrusions, but rather
tolerates intrusions by bypassing the malicious nodes.
An important property of INSENS is that while a
malicious node may be able to compromise a small
number of nodes in its vicinity, it cannot cause
widespread damage in the network.
Jae-Hwan Chang and Lindros Tassiulas[6]
had extended the maximum lifetime routing problem
to include the energy consumption at the receivers
during reception.In wireless sensor networks where
nodes operate on limited battery energy, the efficient
utilization of the energy is very important. One of the
main characteristics of these networks is that the
transmission power consumption is closely coupled
with the route selection. The energy efficiency has
been considered in wireless adhoc network routing,
but the conventional routing objective was to
minimize the total consumed energy in reaching the
destination.
E. Problem Definition
Wireless ad-hoc networks are particularly
vulnerable to denial of service (DoS) attacks due to
their ad-hoc organization, and a great deal of research
has been done to enhance survivability. Vampire
attack can be defined as the composition and
transmission of a message that causes more energy to
be consumed by the network than if an honest node
transmitted a message of identical size to the same
destination, although using different packet headers
[1]. We can measure the strength of the attack by the
ratio of network energy used in the benign case to the
energy used in the malicious case, i.e. the ratio of
network-wide power utilization with malicious nodes
present to energy usage with only honest nodes when
the number and size of packets sent remains constant.
Safety from Vampire attacks implies that this ratio is
1. Energy use by malicious nodes is not considered,
since they can always unilaterally drain their own
batteries [1].There are two important types of
vampire attacks. In the first type of attack, an
adversary composes packets with purposely
introduced routing loops. We call it the carousel
Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07
www.ijera.com 4 | P a g e
Fig. 1.2 An honest route would exit the loop
immediately from node E to sink, but a malicious
packet makes its way around the loop twice more
before exiting.
Fig 1.3 Honest route is dotted while malicious route
is dashed. The last link to the sink is shared.
attack, it targets source routing protocols by
exploiting the limited verification of message headers
forwarding nodes, allowing a single packet to
repeatedly traverse the same set of nodes [1]. In the
second type of attack, also targeting source routing,
an adversary constructs artificially long routes,
potentially traversing every node in the network. We
call this the stretch attack, since it increases packet
path lengths, causing packets to be processed by a
number of nodes that is independent of hop count
along the shortest path between the adversary and
packet destination [1].
The impact of these attacks can be further
increased by combining them, increasing the number
of adversarial nodes in the network, or simply
sending more packets. Although in networks that do
not employ authentication or only use end-to-end
authentication, adversaries are free to replace routes
in any overheard packets, we assume that only
messages originated by adversaries may have
maliciously-composed routes.
From the literature review it is clear that no
mechanisms are available to detect and prevent
vampire attacks in wireless adhoc networks. So, in
this paper a new mechanism is introduced, which
detects the vampire packets and prevents the
forwarding of vampire packets and the formation of
such type of packet inside the node.
II. METHODOLOGY
In this paper, a layered approach is used to
solve the problem with the vampire attacks. Vampire
packet (malicious packet) monitoring is performed
both in network layer (routing protocol layer) and
application layer. The network layer checking helps
to point out the vampire packets from the network
and the application layer checking helps to find out
the vampires inside the running processes (ie, inside
the node). Whenever an incoming packet is detected
that is a vampire then the packet will not be
forwarded and it will be discarded. Whenever a
vampire is detected inside the node simply we can
eliminate it.
A clean-slate secure sensor network routing
protocol[2] by Parno, Luk, Gaustad, and Perrig
“PLGP” can be modified to provably resist Vampire
attacks during the packet forwarding phase. The
original version of the protocol, although designed
for security, is vulnerable to Vampire attacks. PLGP
consists of a topology discovery phase, followed by a
packet forwarding phase, with the former optionally
repeated on a fixed schedule to ensure that topology
information stays current. Here a modification in the
forwarding phase of PLGP to provably avoid the
above-mentioned attacks. First check the no
backtracking property, satisfied for a given packet if
and only if it consistently makes progress toward its
destination in the logical network address space.
More formally: No-backtracking is satisfied if every
packet p traverses the same number of hops whether
or not an adversary is present in the network.
To preserve no-backtracking, need to add a
verifiable path history to every PLGP packet.. The
resulting protocol, PLGP with attestations (PLGPa)
uses this packet history together with PLGP’s tree
routing structure so every node can securely verify
progress, preventing any significant adversarial
influence on the path taken by any packet which
traverses at least one honest node. Whenever a node
n forwards packet p , this by attaching a non-
repayable attestation (signature). These signatures
form a chain attached to every packet, allowing any
node receiving it to validate its path. Every
forwarding node verifies the attestation chain to
ensure that the packet has never travelled away from
its destination in the logical address space [1].
Honest nodes can compose, forward, accept,
or drop messages, and malicious nodes can also
Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07
www.ijera.com 5 | P a g e
arbitrarily transform them. The adversary is assumed
to control m nodes in an N-node network and has
perfect knowledge of the network topology. Finally,
the adversary cannot affect connectivity between any
two honest nodes [1]. The hop count of packet p,
received or forwarded by an honest node, is no
greater than the number of entries in p’s route
attestation field, plus 1. When any node receives a
message, it checks that every node in the path
attestation 1) has a corresponding entry in the
signature chain, and 2) is logically closer to the
destination than the previous hop in the chain. This
way, forwarding nodes can enforce the forward
progress of a message, preserving no-backtracking. If
no attestation is present, the node checks to see if the
originator of the message is a physical neighbour.
Since messages are signed with the originator’s key,
malicious nodes cannot falsely claim to be the origin
of a message, and therefore do not benefit by
removing attestations.
Since no-backtracking guarantees packet
progress, and PLGPa preserves no-backtracking, it is
the only protocol that provably bounds the ratio of
energy used in the adversarial scenario to that used
with only honest nodes to 1, and by the definition of
no-backtracking PLGPa resists Vampire attacks. This
is achieved because packet progress is securely
verifiable [1]. The proposed system will also give
options to display the port scanning details and
entropy variation.
Methodology
Fig 2.1: Architecture of the proposed detection and
control system
Detection of vampires from the network
In order to detect vampires from the
network, an ad-hoc network is needed to create. The
vampire detection system can be installed in a node
as an administrative tool. The IP addresses of all the
nodes in the network are needed to retrieve...All the
incoming packets are monitored. The packets will go
through the anomaly detection system. IP Header
analysis includes each field such as IP Header Length
(IHL), Type of Service (ToS), Identification (ID),
Flags and etc. The IP packet header consists of 20
bytes of data and if the length is below than 20 bytes,
that packet is assume as abnormal packet and go for
analysis before report to administrator. An option
exists within the header that allows further optional
bytes to be added, but this is not normally used.
The TCP or UDP header is analyzed for the
next step in this process. TCP header is built on top
of IP header, which is unreliable and
connectionless.TCP header occupies 20 bytes and has
some limitations in header length. As mentioned,
normal TCP header is 20 bytes but TCP can have
another 40 bytes for option. So the header size is
limited to 60 bytes. TCP Flags have six flags bits
namely URG, ACK, PSH, RST, SYN and FIN, each
of them has a special use in the connection
establishment, connection termination or control
purposes. Only few combinations of the six TCP
flags can be carried in a TCP packet. URG and PSH
flags can be used only when a packet carries data, for
instance a combination of SYN and PSH becomes
invalid. Since TCP SYN Flooding attack will flood
the network with SYN packets, the three-way
handshake application is checked in every packet. At
this stage, packets are divided into two groups
whether infected packets or normal packets. If the
packet is infected, the system will distinguish the
packet and go for analysis again to confirm whether
the packet is truly comes from attackers. Otherwise,
the normal packet will go through the network
sending the data to the destination.
Like TCP header checking, header checking
has to be performed for the application layer protocol
used by the packet.
Packet Filtering
In order to do the packet filtering, many
factors will be considered. There are three main
factors in this paper:
1. The traffic filtered each packet to each protocol
such as TCP, UDP and ICMP.
2. TCP flags SYN, ACK, RST, FIN, are divided to
each group to check the three-way handshake is
complete or not.
3. IP address is valid and not a spoofed address.
These factors are important for detection
method to recognize which packets are the infected
packets in order to distinguish the normal packet
from abnormal packet. Then the analysis for each
packet is done using these factors.
Detection of Vampires from the network
All the activities such as creation, editing
and deletion of the files are monitored to find
Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07
www.ijera.com 6 | P a g e
application layer vampires. Normally if an anomaly
is present, then the normal rate of these processes
will be altered. The file editing and deleting rate will
increase drastically. And file creation rate will
decrease .Consumption of memory will also increase
in an abnormal fashion
Anomaly handling
Anomalies are handled based on the
category in which the anomaly belongs to. If the
vampire is from the network, then that should be
prevented from entering in to the node and from
forwarding to another node. We cannot delete that
packet because the packet is created by some other
node in the network .If any vampire is found inside
the node that should be deleted immediately and
should prevent from forwarding. For avoiding the
entry of anomalies from the network to any packet,
all the packets should satisfy no backtracking
property [1]. The algorithm is explained below
Algorithm (PLGPa)[1]
Function secure_forward_packet (p)
s ← extract_source_address(p);
a ← extract_attestation(p);
if (not verify_source_sig(p)) or
(empty(a) and not is_neighbor(s)) or
(not saowf_verify(a)) then
return ; /* drop(p) */
foreach node in a do
prevnode ← node;
if (not are_neighbors(node, prevnode)) or
(not making_progress(prevnode, node)) then
return ; /* drop(p) */
c ← closest_next_node(s);
p′ ← saowf_append(p);
if is_neighbor(c) then forward(p′, c);
else
forward (p′,next_hop_to_non_neighbor(c));
Entropy and port scan details
Port scan details can be availed by
continuously monitoring all the open ports in the
node. Each individual computer runs on multiple
ports. Port Scanning is the name for the technique
used to identify open ports and services available on
a network host. Hackers typically utilize port
scanning because it is an easy way in which they can
quickly discover services they can break into. In
some cases, hackers can even open the ports
themselves in order to access the targeted computer.
At any time, there are open ports on one's personal
computer, there is potential for the loss of data, the
occurrence of a virus, and at times, even complete
system compromise. It is essential for one to protect
his or her virtual files, as new security risks
concerning personal computers are discovered every
day. Computer protection should be the number one
priority for those who use personal computers. Port
scanning is considered a serious threat to one's PC, as
it can occur without producing any outward signs to
the owner that anything dangerous is taking place. If
any foreign node is continuously trying to access any
open port in a node then that should be suspected.
Then packets from that particular IP address can be
blocked .Entropy variation is an indication of the
variation in packet arrival rate
III.CONCLUSION
In this paper a detection and control method
is introduced for the vampire attacks, a new class of
resource consumption attacks that use routing
protocols to permanently disable ad-hoc wireless
networks by depleting nodes’ battery power.The
proposed methodology can be implemented as four
phases, network layer vampire detection, Application
layer vampire detection, Vampire handling and
entropy and port scan details. By using all these
concepts the system is made more secure against the
vampire attacks. Methods are there to detect the
vampires from the network and inside the node. Once
a vampire is detected then, they are handled
according to their type. Also by using PLGPa
algorithm the packets can be safely forward in a
network. This scheme provides high level of security
against the vampire attacks.
REFERENCES
[1] E Y Vasserman , N Hopper ,Vampire
Attacks: Draining life from wireless Ad hoc
sensor networks, IEEE Transactions on
Mobile Computing,volume 12, issue 2 ,
published on feb 2013(pages 318-332)
[2] Bryan Parno, Mark Luk, Evan Gaustad, and
Adrian Perrig, Secure sensor network
routing: A clean-slate approach, CoNEXT,
2006.
[3] INSENS: Intrusion-tolerant routing for
wireless sensor networks, Computer
Communications 29 (2006), no. 2.
[4] Imad Aad, Jean-Pierre Hubaux, and Edward
W. Knightly, Denial of service resilience in
ad hoc networks, MobiCom, 2004.
[5] Gergely Acs, Levente Buttyan, and Istvan
Vajda, Provably secure on demand source
routing in mobile ad hoc networks, IEEE
Transactions on Mobile Computing 05
(2006), no. 11.
[6] Jae-Hwan Chang and Leandros Tassiulas,
Maximum lifetime routing in wireless
sensor networks, IEEE/ACM Transactions
on Networking 12 (2004), no. 4.
[7] Sheetalkumar Doshi, Shweta Bhandare, and
Timothy X. Brown, An on demand
minimum energy routing protocol for a
wireless ad hoc network, ACM
Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07
www.ijera.com 7 | P a g e
SIGMOBILE Mobile Computing and
Communications Review 6 (2002), no. 3.
[8] Thomas H. Clausen and Philippe Jacquet,
Optimized link state routing protocol
(OLSR), 2003.
[9] John Bellardo and Stefan Savage, 802.11
denial-of-service attacks: real vulnerabilities
and practical solutions, USENIX security,
2003
[10] David R. Raymond, Randy C. Marchany,
Michael I. Brownfield, andScott F. Midkiff,
Effects of denial-of-service attacks on
wireless sensor network MAC protocols,
IEEE Transactions on Vehicular Technology
58 (2009), no. 1.
[11] David R. Raymond and Scott F. Midkiff,
Denial-of-service in wireless sensor
networks: Attacks and defenses, IEEE
Pervasive Computing 7 (2008), no. 1.
[12] Volkan Rodoplu and Teresa H. Meng,
Minimum energy mobile wireless networks,
IEEE Journal on Selected Areas in
Communications 17 (1999), no. 8.
[13] Jing Deng, Richard Han, and Shivakant
Mishra, Defending against path based DoS
attacks in wireless sensor networks, ACM
workshop on security of ad hoc and sensor
networks, 2005.
[14] Thomas H. Clausen and Philippe Jacquet,
Optimized link state routing protocol
(OLSR), 2003.
[15] Sharon Goldberg, David Xiao, Eran Tromer,
Boaz Barak, and Jennifer Rexford, Path-
quality monitoring in the presence of
adversaries, SIGMETRICS, 2008.
[16] Andrea J. Goldsmith and Stephen B.
Wicker, Design challenges for energy-
constrained ad hoc wireless networks, IEEE
Wireless Communications 9 (2002), no. 4.
[17] R. Govindan and A. Reddy, An analysis of
internet inter-domain topology and route
stability, INFOCOM, 1997.
[18] Mina Guirguis, Azer Bestavros, Ibrahim
Matta, and Yuting Zhang, Reduction of
quality (RoQ) attacks on Internet end-
systems, INFOCOM, 2005.
[19] J.L. Hill and D.E. Culler, Mica: a wireless
platform for deeply embedded networks,
IEEE Micro 22 (2002), no. 6.
[20] Yih-Chun Hu, David B. Johnson, and
Adrian Perrig, SEAD: secure efficient
distance vector routing for mobile wireless
ad hoc networks, IEEE workshop on mobile
computing systems and applications, 2002.
[21] Yih-Chun Hu, Adrian Perrig, and David B.
Johnson, Ariadne: A secure on-demand
routing protocol for ad hoc networks,
MobiCom, 2002.
[22] Packet leashes: A defense against wormhole
attacks in wireless ad hoc networks,
INFOCOM, 2003.
[23] Rushing attacks and defense in wireless ad
hoc network routing protocols, WiSE, 2003.
[24] Yangcheng Huang and Saleem Bhatti, Fast-
converging distance vector routing for
wireless mesh networks, ICDCS, 2008
[25] D. Hwang, Bo-Cheng Lai, P. Schaumont, K.
Sakiyama, Yi Fan, Shenglin Yang, A.
Hodjat, and I. Verbauwhede, Design flow
for HW/SW acceleration transparency in the
thumbpod secure embedded system, Design
automation conference, 2003.
[26] L. Iannone, R. Khalili, K. Salamatian, and S.
Fdida, Cross-layer routing in wireless mesh
networks, International symposium on
ireless communication systems, 2004
.[27] David B. Johnson, David A. Maltz, and Josh
Broch, DSR: the dynamic source routing
protocol for multihop wireless ad hoc
networks, Ad hoc networking, 2001.]
Volkan Rodoplu and Teresa H. Meng,
Minimum energy mobile wireless networks,
IEEE Journal on Selected Areas in
Communications 17 (1999), no. 8.

More Related Content

What's hot

Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd Iaetsd
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.Mangesh Vasu
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 

What's hot (19)

E42043640
E42043640E42043640
E42043640
 
525 529
525 529525 529
525 529
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack in
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Jt2416841691
Jt2416841691Jt2416841691
Jt2416841691
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 

Viewers also liked

Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendIJERA Editor
 
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...IJERA Editor
 
Design of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder BlockDesign of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder BlockIJERA Editor
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
 
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...IJERA Editor
 
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...IJERA Editor
 
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different ProgressionOptimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different ProgressionIJERA Editor
 
Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...IJERA Editor
 
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...IJERA Editor
 
Social Media: Stock Market
Social Media: Stock MarketSocial Media: Stock Market
Social Media: Stock MarketPaloma Baytelman
 
المرأة في عيون الشعوب شادية يوسف بنجر
المرأة في عيون الشعوب   شادية يوسف بنجرالمرأة في عيون الشعوب   شادية يوسف بنجر
المرأة في عيون الشعوب شادية يوسف بنجرDr. Shadia Banjar
 
Google
GoogleGoogle
Googleci_gn
 
Amigo seguro
Amigo seguro Amigo seguro
Amigo seguro vidama
 
Bd Infantil 3 Anos A080
Bd Infantil 3 Anos A080Bd Infantil 3 Anos A080
Bd Infantil 3 Anos A080guest121625
 

Viewers also liked (20)

Q044114119
Q044114119Q044114119
Q044114119
 
A044050107
A044050107A044050107
A044050107
 
Aa044190194
Aa044190194Aa044190194
Aa044190194
 
Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research Trend
 
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
 
Design of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder BlockDesign of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder Block
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
 
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
 
A411010107
A411010107A411010107
A411010107
 
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
 
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different ProgressionOptimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
 
Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...
 
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
 
Social Media: Stock Market
Social Media: Stock MarketSocial Media: Stock Market
Social Media: Stock Market
 
Crtic seixal
Crtic seixalCrtic seixal
Crtic seixal
 
المرأة في عيون الشعوب شادية يوسف بنجر
المرأة في عيون الشعوب   شادية يوسف بنجرالمرأة في عيون الشعوب   شادية يوسف بنجر
المرأة في عيون الشعوب شادية يوسف بنجر
 
Google
GoogleGoogle
Google
 
Amigo seguro
Amigo seguro Amigo seguro
Amigo seguro
 
Bd Infantil 3 Anos A080
Bd Infantil 3 Anos A080Bd Infantil 3 Anos A080
Bd Infantil 3 Anos A080
 
Semana 1 Intro Proyecto Fb
Semana 1 Intro Proyecto FbSemana 1 Intro Proyecto Fb
Semana 1 Intro Proyecto Fb
 

Similar to A044060107

ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless networkShiza Kokab
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 

Similar to A044060107 (20)

ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
AODV information
AODV informationAODV information
AODV information
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless network
 
H010524049
H010524049H010524049
H010524049
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
B43011014
B43011014B43011014
B43011014
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

A044060107

  • 1. Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07 www.ijera.com 1 | P a g e Detection and Control of Vampire Attacks in Ad-Hoc Wireless Networks Anoopa S1 , Sudha S K2 M. Tech Scholar, Department of Computer Science & Engineering, Sarabhai Institute of science and Technology, Vellanadu, Trivandrum, India Associate Professor, Department of Computer Science & Engineering, Sarabhai Institute of science and Technology, Vellanadu, Trivandrum, India Abstract Ad-hoc low-power wireless networks are the most promising research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of service at the routing or medium access control levels. Earlier, the resource depletion attacks are considered only as a routing problem, very recently these are classified in to a new group called “vampire attacks”. This thesis work explores the identification of resource depletion attacks at the routing protocol layer and in the application layer, which permanently disable networks by quickly draining nodes’ battery power. These Vampire attacks are not specific to a particular protocol, but rather rely on the properties of many popular classes of routing protocols. It is clear that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. In this work a detection and control strategy is proposed for these vampire attacks, along with a secure packet forwarding mechanism, which will save Ad-hoc wireless nodes from power drainage due to vampire packets. Keywords: Vampire attack, Wireless Ad-Hoc network power drainage, PLGPa etc. I. INTRODUCTION A .Background Ad-hoc mode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access points. A wireless ad hoc network is a decentralized type of wireless network. The network is Ad-hoc because it does not rely on a pre existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity. An Ad-hoc network tends to feature a small group of devices all in very close proximity to each other. Performance suffers as the number of devices grows, and a large Ad-hoc network quickly becomes difficult to manage. Ad-hoc networks cannot bridge to wired LANs or to the Internet without installing a special-purpose gateway. In addition to the classic routing, Ad- hoc networks can use flooding for forwarding data. An Ad-hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other Ad-hoc network device in link range. Ad hoc network often refers to a mode of operation of IEEE 802.11 wireless networks. It also refers to a network device's ability to maintain link status information for any number of devices in a 1-link (“hop") range, and thus, this is most often a Layer 2 activity. Because this is only a Layer 2 activity, ad hoc networks alone may not support a routable IP network environment without additional Layer 2 or Layer 3 capabilities. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural disasters or military conflicts. The presence of dynamic and adaptive routing protocols enables ad hoc networks to be formed quickly. Wireless ad hoc networks can be further classified by their application. A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. Ad hoc is Latin and means "for this purpose”. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. RESEARCH ARTICLE OPEN ACCESS
  • 2. Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07 www.ijera.com 2 | P a g e Fig 1.1: Wireless adhoc network . A mobile ad hoc network has attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multihop mobile wireless network that has neither a fixed infrastructure nor a central server. Each node in a MANET acts as a router, and communicates with each other. A large variety of MANET applications have been developed. For example, a MANET can be used in special situations, where installing infrastructure may be difficult, or even infeasible, such as a battlefield or a disaster area. A mobile peer- to-peer file sharing system is another interesting MANET application. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a Link Layer ad hoc network. The growth of laptops and 802.11/Wi-Fi wireless networking has made MANETs a popular research topic since the mid 1990s. Different protocols are then evaluated based on measure such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput etc. Characteristics-A wireless ad-hoc network is a collection of mobile devices equipped with a transmitter and receiver, connected in the absence of fixed infrastructure. Wireless ad-hoc network is defined with characteristics such as purpose-specific, autonomous and dynamic. In comparison with fixed wireless networks, there is no master slave relationship that exists in a wireless ad-hoc network. Nodes rely on each other to established communication, thus each node acts as a router. Therefore, in a wireless ad-hoc network, a packet can travel from a source to a destination either directly, or through some set of intermediate packet forwarding nodes. The control and management of wireless ad- hoc network is distributed among the participating nodes. Each node is responsible to forward packet to other nodes in the networks. The nodes are also collaborate themselves to implement network routine functions such as security The major characteristics of wireless adhoc networks are: Power consumption constrains for nodes using batteries, Ability to cope with node failures, Mobility of nodes, Dynamic network topology, Communication failures, Ability to withstand complex environmental conditions, Ease of use, Deeply distributed architecture. B. Problem Objective The objective of this paper is to create a secure mechanism which detects the vampire packets and prevents the forwarding of vampire packets and the formation of such type of packet inside the node. C. Problem Motivation The life of the wireless adhoc network, especially that of sensor network depends on its node’s battery power. In most of the applications, battery recharging or replacing is impossible. Power drainage will leads to the failure of the node and it will affect the network also. Data loss will also occur. Therefore an efficient energy utilization scheme is required, that is, data packets should be transmitted by using minimum units of energy. But some malicious packets called vampire packets may consume more energy for packet forwarding than that of honest packet forwarding .This will lead to power drainage of node and network failure. If we can find and avoid these type of vampire packets, then we can increase the life of the node and thereby the network. It will be very crucial in many of the situations and will increase the wide acceptability of adhoc wireless networks in many important applications. D. Literature Review Eugene Y. Vasserman and Nicholas Hopper [1] introduced a definition for vampire attacks in february 2013. Vampire attacks are clearly defined in their study. The study makes three primary contributions. First evaluates the vulnerabilities of existing protocols to routing layer battery depletion attacks. The security measures to prevent Vampire attacks are orthogonal to those used to protect routing infrastructure, and so existing secure routing protocols such as Ariadne, SAODV, and SEAD do not protect against Vampire attacks. Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid
  • 3. Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07 www.ijera.com 3 | P a g e network paths and protocol compliant messages. The authors proposed defenses against some of the forwarding-phase attacks and described PLGPa, the first sensor network routing protocol that provably bounds damage from Vampire attacks by verifying that packets consistently make progress toward their destinations. They have not offered a fully satisfactory solution for Vampire attacks during the topology discovery phase, but suggested some intuition about damage limitations possible with further modifications to PLGPa. They concentrated only in the network layer but not considered about the application layer where the malicious packet actually originates. Gergely Acs, Levente Buttyan, and Istvan Vajda [5] had introduced a new attack on Ariadne, a previously published “secure” routing protocol. These attacks clearly demonstrate that flaws can be very subtle, and therefore, hard to discover by informal reasoning. Hence, they advocate a more systematic approach to analyzing ad hoc routing protocols, which is based on a rigorous mathematical model, in which precise definitions of security can be given, and sound proof techniques can be developed. Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly[4], mainly focuses on the design and study DoS attacks in order to assess the damage that difficult-to-detect attackers can cause. The authors presented a novel DoS attack perpetrated by JellyFish: relay nodes that stealthily disorder, delay, or periodically drop packets that they are expected to forward, in a way that leads astray end-to-end congestion control protocols. This attack is protocol- compliant and yet has a devastating impact on the throughput of closed-loop flows, such as TCP flows and congestion-controlled UDP flows. For completeness, they have also considered a well known attack, the Black Hole attack, as its impact on open-loop flows is similar to the effect of JellyFish on closed-loop flows.they studied these attacks in a variety of settings and have provided a quantification of the damage they can inflict. It is showed that, such attacks can actually increase the capacity of ad hoc networks as they will starve all multihop flows and provide all resources to one-hop flows that cannot be intercepted by JellyFish or Black Holes. Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig [2] introduce a secure routing protocol for Ad-hoc wireless networks. The deployment of sensor networks in security-and safety-critical environments requires secure communication primitives. In this study, the authors design, implement, and evaluate a new secure routing protocol for sensor networks. The protocol presented in this paper requires no special hardware and provides message delivery even in an environment with active adversaries. They adopt a clean-slate approach and design a new sensor network routing protocol with security and efficiency as central design parameters. The protocol is efficient yet highly resilient to active attacks. An article of computer communications [3] , 29(2006),no 2, describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS constructs forwarding tables at each node to facilitate communication between sensor nodes and a base station. It minimizes computation, communication, storage, and bandwidth requirements at the sensor nodes at the expense of increased computation, communication, storage, and bandwidth requirements at the base station. INSENS does not rely on detecting intrusions, but rather tolerates intrusions by bypassing the malicious nodes. An important property of INSENS is that while a malicious node may be able to compromise a small number of nodes in its vicinity, it cannot cause widespread damage in the network. Jae-Hwan Chang and Lindros Tassiulas[6] had extended the maximum lifetime routing problem to include the energy consumption at the receivers during reception.In wireless sensor networks where nodes operate on limited battery energy, the efficient utilization of the energy is very important. One of the main characteristics of these networks is that the transmission power consumption is closely coupled with the route selection. The energy efficiency has been considered in wireless adhoc network routing, but the conventional routing objective was to minimize the total consumed energy in reaching the destination. E. Problem Definition Wireless ad-hoc networks are particularly vulnerable to denial of service (DoS) attacks due to their ad-hoc organization, and a great deal of research has been done to enhance survivability. Vampire attack can be defined as the composition and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination, although using different packet headers [1]. We can measure the strength of the attack by the ratio of network energy used in the benign case to the energy used in the malicious case, i.e. the ratio of network-wide power utilization with malicious nodes present to energy usage with only honest nodes when the number and size of packets sent remains constant. Safety from Vampire attacks implies that this ratio is 1. Energy use by malicious nodes is not considered, since they can always unilaterally drain their own batteries [1].There are two important types of vampire attacks. In the first type of attack, an adversary composes packets with purposely introduced routing loops. We call it the carousel
  • 4. Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07 www.ijera.com 4 | P a g e Fig. 1.2 An honest route would exit the loop immediately from node E to sink, but a malicious packet makes its way around the loop twice more before exiting. Fig 1.3 Honest route is dotted while malicious route is dashed. The last link to the sink is shared. attack, it targets source routing protocols by exploiting the limited verification of message headers forwarding nodes, allowing a single packet to repeatedly traverse the same set of nodes [1]. In the second type of attack, also targeting source routing, an adversary constructs artificially long routes, potentially traversing every node in the network. We call this the stretch attack, since it increases packet path lengths, causing packets to be processed by a number of nodes that is independent of hop count along the shortest path between the adversary and packet destination [1]. The impact of these attacks can be further increased by combining them, increasing the number of adversarial nodes in the network, or simply sending more packets. Although in networks that do not employ authentication or only use end-to-end authentication, adversaries are free to replace routes in any overheard packets, we assume that only messages originated by adversaries may have maliciously-composed routes. From the literature review it is clear that no mechanisms are available to detect and prevent vampire attacks in wireless adhoc networks. So, in this paper a new mechanism is introduced, which detects the vampire packets and prevents the forwarding of vampire packets and the formation of such type of packet inside the node. II. METHODOLOGY In this paper, a layered approach is used to solve the problem with the vampire attacks. Vampire packet (malicious packet) monitoring is performed both in network layer (routing protocol layer) and application layer. The network layer checking helps to point out the vampire packets from the network and the application layer checking helps to find out the vampires inside the running processes (ie, inside the node). Whenever an incoming packet is detected that is a vampire then the packet will not be forwarded and it will be discarded. Whenever a vampire is detected inside the node simply we can eliminate it. A clean-slate secure sensor network routing protocol[2] by Parno, Luk, Gaustad, and Perrig “PLGP” can be modified to provably resist Vampire attacks during the packet forwarding phase. The original version of the protocol, although designed for security, is vulnerable to Vampire attacks. PLGP consists of a topology discovery phase, followed by a packet forwarding phase, with the former optionally repeated on a fixed schedule to ensure that topology information stays current. Here a modification in the forwarding phase of PLGP to provably avoid the above-mentioned attacks. First check the no backtracking property, satisfied for a given packet if and only if it consistently makes progress toward its destination in the logical network address space. More formally: No-backtracking is satisfied if every packet p traverses the same number of hops whether or not an adversary is present in the network. To preserve no-backtracking, need to add a verifiable path history to every PLGP packet.. The resulting protocol, PLGP with attestations (PLGPa) uses this packet history together with PLGP’s tree routing structure so every node can securely verify progress, preventing any significant adversarial influence on the path taken by any packet which traverses at least one honest node. Whenever a node n forwards packet p , this by attaching a non- repayable attestation (signature). These signatures form a chain attached to every packet, allowing any node receiving it to validate its path. Every forwarding node verifies the attestation chain to ensure that the packet has never travelled away from its destination in the logical address space [1]. Honest nodes can compose, forward, accept, or drop messages, and malicious nodes can also
  • 5. Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07 www.ijera.com 5 | P a g e arbitrarily transform them. The adversary is assumed to control m nodes in an N-node network and has perfect knowledge of the network topology. Finally, the adversary cannot affect connectivity between any two honest nodes [1]. The hop count of packet p, received or forwarded by an honest node, is no greater than the number of entries in p’s route attestation field, plus 1. When any node receives a message, it checks that every node in the path attestation 1) has a corresponding entry in the signature chain, and 2) is logically closer to the destination than the previous hop in the chain. This way, forwarding nodes can enforce the forward progress of a message, preserving no-backtracking. If no attestation is present, the node checks to see if the originator of the message is a physical neighbour. Since messages are signed with the originator’s key, malicious nodes cannot falsely claim to be the origin of a message, and therefore do not benefit by removing attestations. Since no-backtracking guarantees packet progress, and PLGPa preserves no-backtracking, it is the only protocol that provably bounds the ratio of energy used in the adversarial scenario to that used with only honest nodes to 1, and by the definition of no-backtracking PLGPa resists Vampire attacks. This is achieved because packet progress is securely verifiable [1]. The proposed system will also give options to display the port scanning details and entropy variation. Methodology Fig 2.1: Architecture of the proposed detection and control system Detection of vampires from the network In order to detect vampires from the network, an ad-hoc network is needed to create. The vampire detection system can be installed in a node as an administrative tool. The IP addresses of all the nodes in the network are needed to retrieve...All the incoming packets are monitored. The packets will go through the anomaly detection system. IP Header analysis includes each field such as IP Header Length (IHL), Type of Service (ToS), Identification (ID), Flags and etc. The IP packet header consists of 20 bytes of data and if the length is below than 20 bytes, that packet is assume as abnormal packet and go for analysis before report to administrator. An option exists within the header that allows further optional bytes to be added, but this is not normally used. The TCP or UDP header is analyzed for the next step in this process. TCP header is built on top of IP header, which is unreliable and connectionless.TCP header occupies 20 bytes and has some limitations in header length. As mentioned, normal TCP header is 20 bytes but TCP can have another 40 bytes for option. So the header size is limited to 60 bytes. TCP Flags have six flags bits namely URG, ACK, PSH, RST, SYN and FIN, each of them has a special use in the connection establishment, connection termination or control purposes. Only few combinations of the six TCP flags can be carried in a TCP packet. URG and PSH flags can be used only when a packet carries data, for instance a combination of SYN and PSH becomes invalid. Since TCP SYN Flooding attack will flood the network with SYN packets, the three-way handshake application is checked in every packet. At this stage, packets are divided into two groups whether infected packets or normal packets. If the packet is infected, the system will distinguish the packet and go for analysis again to confirm whether the packet is truly comes from attackers. Otherwise, the normal packet will go through the network sending the data to the destination. Like TCP header checking, header checking has to be performed for the application layer protocol used by the packet. Packet Filtering In order to do the packet filtering, many factors will be considered. There are three main factors in this paper: 1. The traffic filtered each packet to each protocol such as TCP, UDP and ICMP. 2. TCP flags SYN, ACK, RST, FIN, are divided to each group to check the three-way handshake is complete or not. 3. IP address is valid and not a spoofed address. These factors are important for detection method to recognize which packets are the infected packets in order to distinguish the normal packet from abnormal packet. Then the analysis for each packet is done using these factors. Detection of Vampires from the network All the activities such as creation, editing and deletion of the files are monitored to find
  • 6. Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07 www.ijera.com 6 | P a g e application layer vampires. Normally if an anomaly is present, then the normal rate of these processes will be altered. The file editing and deleting rate will increase drastically. And file creation rate will decrease .Consumption of memory will also increase in an abnormal fashion Anomaly handling Anomalies are handled based on the category in which the anomaly belongs to. If the vampire is from the network, then that should be prevented from entering in to the node and from forwarding to another node. We cannot delete that packet because the packet is created by some other node in the network .If any vampire is found inside the node that should be deleted immediately and should prevent from forwarding. For avoiding the entry of anomalies from the network to any packet, all the packets should satisfy no backtracking property [1]. The algorithm is explained below Algorithm (PLGPa)[1] Function secure_forward_packet (p) s ← extract_source_address(p); a ← extract_attestation(p); if (not verify_source_sig(p)) or (empty(a) and not is_neighbor(s)) or (not saowf_verify(a)) then return ; /* drop(p) */ foreach node in a do prevnode ← node; if (not are_neighbors(node, prevnode)) or (not making_progress(prevnode, node)) then return ; /* drop(p) */ c ← closest_next_node(s); p′ ← saowf_append(p); if is_neighbor(c) then forward(p′, c); else forward (p′,next_hop_to_non_neighbor(c)); Entropy and port scan details Port scan details can be availed by continuously monitoring all the open ports in the node. Each individual computer runs on multiple ports. Port Scanning is the name for the technique used to identify open ports and services available on a network host. Hackers typically utilize port scanning because it is an easy way in which they can quickly discover services they can break into. In some cases, hackers can even open the ports themselves in order to access the targeted computer. At any time, there are open ports on one's personal computer, there is potential for the loss of data, the occurrence of a virus, and at times, even complete system compromise. It is essential for one to protect his or her virtual files, as new security risks concerning personal computers are discovered every day. Computer protection should be the number one priority for those who use personal computers. Port scanning is considered a serious threat to one's PC, as it can occur without producing any outward signs to the owner that anything dangerous is taking place. If any foreign node is continuously trying to access any open port in a node then that should be suspected. Then packets from that particular IP address can be blocked .Entropy variation is an indication of the variation in packet arrival rate III.CONCLUSION In this paper a detection and control method is introduced for the vampire attacks, a new class of resource consumption attacks that use routing protocols to permanently disable ad-hoc wireless networks by depleting nodes’ battery power.The proposed methodology can be implemented as four phases, network layer vampire detection, Application layer vampire detection, Vampire handling and entropy and port scan details. By using all these concepts the system is made more secure against the vampire attacks. Methods are there to detect the vampires from the network and inside the node. Once a vampire is detected then, they are handled according to their type. Also by using PLGPa algorithm the packets can be safely forward in a network. This scheme provides high level of security against the vampire attacks. REFERENCES [1] E Y Vasserman , N Hopper ,Vampire Attacks: Draining life from wireless Ad hoc sensor networks, IEEE Transactions on Mobile Computing,volume 12, issue 2 , published on feb 2013(pages 318-332) [2] Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006. [3] INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications 29 (2006), no. 2. [4] Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly, Denial of service resilience in ad hoc networks, MobiCom, 2004. [5] Gergely Acs, Levente Buttyan, and Istvan Vajda, Provably secure on demand source routing in mobile ad hoc networks, IEEE Transactions on Mobile Computing 05 (2006), no. 11. [6] Jae-Hwan Chang and Leandros Tassiulas, Maximum lifetime routing in wireless sensor networks, IEEE/ACM Transactions on Networking 12 (2004), no. 4. [7] Sheetalkumar Doshi, Shweta Bhandare, and Timothy X. Brown, An on demand minimum energy routing protocol for a wireless ad hoc network, ACM
  • 7. Anoopa S et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07 www.ijera.com 7 | P a g e SIGMOBILE Mobile Computing and Communications Review 6 (2002), no. 3. [8] Thomas H. Clausen and Philippe Jacquet, Optimized link state routing protocol (OLSR), 2003. [9] John Bellardo and Stefan Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX security, 2003 [10] David R. Raymond, Randy C. Marchany, Michael I. Brownfield, andScott F. Midkiff, Effects of denial-of-service attacks on wireless sensor network MAC protocols, IEEE Transactions on Vehicular Technology 58 (2009), no. 1. [11] David R. Raymond and Scott F. Midkiff, Denial-of-service in wireless sensor networks: Attacks and defenses, IEEE Pervasive Computing 7 (2008), no. 1. [12] Volkan Rodoplu and Teresa H. Meng, Minimum energy mobile wireless networks, IEEE Journal on Selected Areas in Communications 17 (1999), no. 8. [13] Jing Deng, Richard Han, and Shivakant Mishra, Defending against path based DoS attacks in wireless sensor networks, ACM workshop on security of ad hoc and sensor networks, 2005. [14] Thomas H. Clausen and Philippe Jacquet, Optimized link state routing protocol (OLSR), 2003. [15] Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, and Jennifer Rexford, Path- quality monitoring in the presence of adversaries, SIGMETRICS, 2008. [16] Andrea J. Goldsmith and Stephen B. Wicker, Design challenges for energy- constrained ad hoc wireless networks, IEEE Wireless Communications 9 (2002), no. 4. [17] R. Govindan and A. Reddy, An analysis of internet inter-domain topology and route stability, INFOCOM, 1997. [18] Mina Guirguis, Azer Bestavros, Ibrahim Matta, and Yuting Zhang, Reduction of quality (RoQ) attacks on Internet end- systems, INFOCOM, 2005. [19] J.L. Hill and D.E. Culler, Mica: a wireless platform for deeply embedded networks, IEEE Micro 22 (2002), no. 6. [20] Yih-Chun Hu, David B. Johnson, and Adrian Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, IEEE workshop on mobile computing systems and applications, 2002. [21] Yih-Chun Hu, Adrian Perrig, and David B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, MobiCom, 2002. [22] Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, INFOCOM, 2003. [23] Rushing attacks and defense in wireless ad hoc network routing protocols, WiSE, 2003. [24] Yangcheng Huang and Saleem Bhatti, Fast- converging distance vector routing for wireless mesh networks, ICDCS, 2008 [25] D. Hwang, Bo-Cheng Lai, P. Schaumont, K. Sakiyama, Yi Fan, Shenglin Yang, A. Hodjat, and I. Verbauwhede, Design flow for HW/SW acceleration transparency in the thumbpod secure embedded system, Design automation conference, 2003. [26] L. Iannone, R. Khalili, K. Salamatian, and S. Fdida, Cross-layer routing in wireless mesh networks, International symposium on ireless communication systems, 2004 .[27] David B. Johnson, David A. Maltz, and Josh Broch, DSR: the dynamic source routing protocol for multihop wireless ad hoc networks, Ad hoc networking, 2001.] Volkan Rodoplu and Teresa H. Meng, Minimum energy mobile wireless networks, IEEE Journal on Selected Areas in Communications 17 (1999), no. 8.