International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
current issues
Volume-7,Issue-1  ( May, 2019 )
Statistics report
May. 2019
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 13
Paper Published : 138
No. of Authors : 353
  Journal Paper

Paper Title
Exposure And Verification Of Neighbour Positions And Exhausting Existence From Wireless Ad Hoc Net Work

Abstract
we address this open issue by proposing a fully dispersed cooperative solution that is robust against independent and colluding adversaries, and can be impair only by an overwhelming presence of adversaries. Results show that our protocol can thwart more than 99 percent of the attacks under the best possible conditions for the adversaries, with smallest false positive rates. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many accepted classes of steering protocols. We find that all examined protocols are weak to Vampire attacks, which are devastating, hard to notice, and are easy to carry out using as few as one hateful insider sharing only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy custom by a factor of O(N), where N in the number of network nodes. We discuss methods to alleviate these types of attacks, including a new proof-of-concept protocol that provably bounds the break caused by Vampires during the packet forwarding phase.


Author - R.S.Mamatha, G.Anusha, Y. Mohanaroopa

| PDF |
Viewed - 85
| Published on 2014-11-03
   
   
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-6,Issue-2(Nov, 2018)
The Conference World

JOURNAL SUPPORTED BY