3,638 research outputs found
Scrounger Outbreaks Strenuous Life From Wireless Adhoc Sensor Networks
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad hoc networks. Ad-hoc low power wireless networks are in research in both sensing and pervasive computing. The proposed method discusses about resource depletion attacks at the routing protocol layer, which drains battery power. The motivation of a large portion of research efforts has been to maximize the lifetime of the network, where network lifetime is typically measured from the instant of deployment to the point when one of the nodes has exp¬¬¬anded its limited power source and becomes in-operational – commonly referred as first node failure. A novel approach for routing protocols, affect from attack even those designed to be protected, be short of protection from these attacks, which call Vampire attacks, which permanently disable networks by quickly draining nodes battery power. These energy draining attacks are not specific to any specific protocol which are disturbing, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. There are a lot of protocols developed to protect from Denial of Service attack, but it is not completely possible. One such Denial of Service attack is Vampire attack-Draining of node life from wireless ad-hoc sensor networks. This paper presents a method to tolerate the attack by using the Cluster Head. In case of any energy draining attack, the Cluster Head engages in the situation and delivers the packet to destination without dropping the packet. Thus providing a victorious and reliable message delivery even in case of Vampire attack. A novel PLGP method is proposed to mitigate the battery power draining attacks by improving the existing routing protoco
Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks
In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power efficiency. We term this the Droplet attack, as it attains enormous disruption by dropping small, payload-less frame headers to its victim's radio receiver, depriving the latter of bandwidth and sleep time. We demonstrate the Droplet attack's high damage rate to full duty-cycle receivers, and further show that a high frequency version of Droplet can even force nodes running on very low duty-cycle MAC protocols to drop most of their packets
Recommended from our members
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks
The propagation approach of a botnet largely dictates its formation, establishing a foundation of bots for future exploitation. The chosen propagation method determines the attack surface, and consequently, the degree of network penetration, as well as the overall size and the eventual attack potency. It is therefore essential to understand propagation behaviours and influential factors in order to better secure vulnerable systems. Whilst botnet propagation is generally well-studied, newer technologies like IoT have unique characteristics which are yet to be thoroughly explored. In this paper, we apply the principles of epidemic modelling to IoT networks consisting of wireless sensor nodes. We build IoT-SIS, a novel propagation model which considers the impact of IoT-specific characteristics like limited processing power, energy restrictions, and node density on the formation of a botnet. Focusing on worm-based propagation, this model is used to explore the dynamics of spread using numerical simulations and the Monte Carlo method, and to discuss the real-life implications of our findings
- …