Computer science help needed with Discussion Post Replies

Nov 5th, 2015
SKTFaker
Category:
Computer Science
Price: $10 USD

Question description

  I chose an article that appeared in the International Journal of Innovative Research in Computer and Communication Engineering.  The article titled Vampire Attack Detection in Wireless Sensor Networks was written by Jayashree and Mohanaraj. With Halloween coming up, I thought it would be a fun to use this article.  The article focuses on the need for secured data transmission using wireless sensor networks.

  The article gives a little history on wireless sensor networks coming from the increased needs of military applications, and how now these networks are used across multiple industrial fields and consumer applications.  One example given talks about tracking a mobile target, and making sure the networks have energy efficiency to ensure a long network life.  The problem is that energy efficiency can provide a negative impact to the quality of service provided when tracking a mobile target.  “For example, forcing nodes to sleep may result in missing the passing target and lowering the tracking coverage. Therefore, energy efficient target tracking should improve the tradeoff between energy efficiency and tracking performance e.g., by improving energy efficiency at the expense of a relatively small loss on tracking performance” (Mohanaraj & Jayashree).

  The article then discusses how these networks are vulnerable to vampire attacks.  Vampire attacks work to deplete resources at a routing protocol layer, which disables wireless networks by quickly draining the battery power. “These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols” (Vasserman & Hopper). Unlike normal DoS attacks, Vampire attacks do not disrupt immediate availability but work over time to disable the entire network.  Because these attacks are not protocol specific, they are extremely hard to track and identify, which leads to more danger.

To combat these attacks, packets are tracked and verified to ensure the packet path can be validated.  Each node verifies the chain to ensure the packet has never travelled away from its destination in the logical address space.

References:

Mohanraj, T., & Jayashree, S. (2015). Vampire attack detection in wireless sensor networks. International Journal of Innovative Research in Computer and Communication Engineering, 3(2), 751-756. doi:10.15680/ijircce.2015.0302022

Vasserman, E., & Hopper, N. (2013). Vampire attacks: Draining life from wireless ad-hoc sensor networks. IEEE Transactions on Mobile Computing, doi.2013.


What you need to do is... Just Read the above Posted Matter and Reply with your Suggestions to the Post or Add Some More Important Points regarding this above Topic. 

Requirement: 

4 - 5 lines with Good Grammar 


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UIUC
PREMIUM TUTOR

Studypool has helped 1,244,100 students

7 Reviews


Summary
Quality
Communication
On Time
Value
kpcutie
Dec 6th, 2016
" Excellent job "
Hemapathy
Nov 23rd, 2016
" all I can say is wow very fast work, great work thanks "
BlueOcean
Nov 9th, 2016
" Awesome! Exactly what I wanted. "
kevin12622
Oct 31st, 2016
" Goes above and beyond expectations ! "
ashleyisgod
Oct 18th, 2016
" Top quality work from this guy! I'll be back! "
likeplum4
Oct 9th, 2016
" Excellent work as usual "
Molly_Moon
Sep 25th, 2016
" AMAZING as always! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1826 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors