I chose an article that appeared in the
International Journal of Innovative Research in Computer and Communication
Engineering. The article titled Vampire
Attack Detection in Wireless Sensor Networks was written by Jayashree and
Mohanaraj. With Halloween coming up, I thought it would be a fun to use this
article. The article focuses on the need
for secured data transmission using wireless sensor networks.
The article gives a little history
on wireless sensor networks coming from the increased needs of military
applications, and how now these networks are used across multiple industrial
fields and consumer applications. One
example given talks about tracking a mobile target, and making sure the
networks have energy efficiency to ensure a long network life. The problem is that energy efficiency can
provide a negative impact to the quality of service provided when tracking a
mobile target. “For example, forcing
nodes to sleep may result in missing the passing target and lowering the
tracking coverage. Therefore, energy efficient target tracking should improve
the tradeoff between energy efficiency and tracking performance e.g., by
improving energy efficiency at the expense of a relatively small loss on
tracking performance” (Mohanaraj & Jayashree).
The article then discusses how these
networks are vulnerable to vampire attacks.
Vampire attacks work to deplete resources at a routing protocol layer,
which disables wireless networks by quickly draining the battery power. “These “Vampire” attacks are not specific to
any specific protocol, but rather rely on the properties of many popular
classes of routing protocols” (Vasserman & Hopper). Unlike normal DoS
attacks, Vampire attacks do not disrupt immediate availability but work over
time to disable the entire network.
Because these attacks are not protocol specific, they are extremely hard
to track and identify, which leads to more danger.
these attacks, packets are tracked and verified to ensure the packet path can
be validated. Each node verifies the
chain to ensure the packet has never travelled away from its destination in the
logical address space.
T., & Jayashree, S. (2015). Vampire attack detection in wireless sensor
networks. International Journal of Innovative Research in Computer and
Communication Engineering, 3(2), 751-756. doi:10.15680/ijircce.2015.0302022
E., & Hopper, N. (2013). Vampire attacks: Draining life from wireless
ad-hoc sensor networks. IEEE Transactions on Mobile Computing, doi.2013.
What you need to do is... Just Read
the above Posted Matter and Reply with your Suggestions to the Post or Add Some
More Important Points regarding this above Topic.
4 - 5 lines with Good Grammar