Advertisement

Simulation-Based Comparison of Vampire Attacks on Traditional Manet Routing Protocols

  • Joshua Reginald Pullagura
  • Dhulipalla Venkata Rao
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 9)

Abstract

A mobile ad hoc network is wireless network without infrastructure and is self-configuring network of mobile nodes where nodes move to their places randomly, leave around or join the network. Over the many years, simulation work has been carried out to achieve a new reliable routing protocol. This paper seeks to rationalize Vampire attacks on the network layer that deals with route establishment. During route establishment and packet forwarding, Vampire attacks perpetually weaken the network by draining nodes’ energy. The Vampire attacks degrade the performance of routing protocol. All the basic traditional routing protocols those are examined here are open to Vampire attacks, which are damaging, and is time-consuming to troubleshoot. Simulation results show DSDV performs better than its counter parts.

Keyword

AODV DSR DSDV Vampire 

References

  1. 1.
    Siraj S, Kumar Gupta A, Badgujar R (2012) Network simulation tools survey. Int J Adv Res Comput Commun Eng 1Google Scholar
  2. 2.
    Weingartner E, vom Lehn H, Wehrle K (2009) A performance comparison of recent network simulators. In: IEEE International Communications (ICC’09), Dresden, GermanyGoogle Scholar
  3. 3.
    Johnson DB, Maltz DA, Dynamic source routing in ad hoc wireless networks. In: Imielinski T, Korth H (eds) Mobile computing. Kluwer Academic PublishersGoogle Scholar
  4. 4.
    Perkins CE, Bhagwat P, Highly dynamic destination sequence-vector routing (DSDV) for mobile computers. Comput Commun RevGoogle Scholar
  5. 5.
    de Morias C, Agrawal DP, Ad hoc and sensor networks theory and applications. World Scientific Publishing Co. Pte. LtdGoogle Scholar
  6. 6.
    Vasserman EY, Hopper N (2013) Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans Mobile Comput 12(2)Google Scholar
  7. 7.
    Yang H, Luo H (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun 11(1)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Joshua Reginald Pullagura
    • 1
  • Dhulipalla Venkata Rao
    • 2
  1. 1.Vignan University GunturGunturIndia
  2. 2.Narasaraopet Institute of TechnologyGunturIndia

Personalised recommendations