Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad hoc networks. Ad-hoc low power wireless networks are in research in both sensing and pervasive computing. The proposed method discusses about resource depletion attacks at the routing protocol layer, which drains battery power. The motivation of a large portion of research efforts has been to maximize the lifetime of the network, where network lifetime is typically measured from the instant of deployment to the point when one of the nodes has exp¬¬¬anded its limited power source and becomes in-operational – commonly referred as first node failure. A novel approach for routing protocols, affect from attack even those designed to be protected, be short of protection from these attacks, which call Vampire attacks, which permanently disable networks by quickly draining nodes battery power. These energy draining attacks are not specific to any specific protocol which are disturbing, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. There are a lot of protocols developed to protect from Denial of Service attack, but it is not completely possible. One such Denial of Service attack is Vampire attack-Draining of node life from wireless ad-hoc sensor networks. This paper presents a method to tolerate the attack by using the Cluster Head. In case of any energy draining attack, the Cluster Head engages in the situation and delivers the packet to destination without dropping the packet. Thus providing a victorious and reliable message delivery even in case of Vampire attack. A novel PLGP method is proposed to mitigate the battery power draining attacks by improving the existing routing protocol.
[1]
M.Kanchana,et al.
VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS
,
2014
.
[2]
Shivakant Mishra,et al.
Defending against path-based DoS attacks in wireless sensor networks
,
2005,
SASN '05.
[3]
Laura Marie Feeney,et al.
An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks
,
2001,
Mob. Networks Appl..
[4]
Levente Buttyán,et al.
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
,
2006,
IEEE Transactions on Mobile Computing.
[5]
Stefan Savage,et al.
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
,
2003,
USENIX Security Symposium.
[6]
Adrian Perrig,et al.
Security and Privacy in Sensor Networks
,
2003,
Computer.
[7]
Adrian Perrig,et al.
Secure sensor network routing: a clean-slate approach
,
2006,
CoNEXT '06.
[8]
Deian Stefan,et al.
Fast Implementations of AES on Various Platforms
,
2009,
IACR Cryptol. ePrint Arch..
[9]
Ian F. Blake,et al.
Elliptic curves in cryptography
,
1999
.
[10]
Pekka Nikander,et al.
DOS-Resistant Authentication with Client Puzzles
,
2000,
Security Protocols Workshop.
[11]
Philippe Jacquet,et al.
Optimized Link State Routing Protocol (OLSR)
,
2003,
RFC.
[12]
Edward W. Knightly,et al.
Denial of service resilience in ad hoc networks
,
2004,
MobiCom '04.
[13]
Joongseok Park,et al.
Maximum Lifetime Routing In Wireless Sensor Networks ∗
,
2005
.
[14]
Tuomas Aura.
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)
,
2000,
Security Protocols Workshop.