CFP last date
22 April 2024
Reseach Article

Detection and Removal of Vampire Attack in Wireless Sensor Network

by Manish Soni, Bharat Pahadiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 7
Year of Publication: 2015
Authors: Manish Soni, Bharat Pahadiya
10.5120/ijca2015906101

Manish Soni, Bharat Pahadiya . Detection and Removal of Vampire Attack in Wireless Sensor Network. International Journal of Computer Applications. 126, 7 ( September 2015), 46-50. DOI=10.5120/ijca2015906101

@article{ 10.5120/ijca2015906101,
author = { Manish Soni, Bharat Pahadiya },
title = { Detection and Removal of Vampire Attack in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 7 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 46-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number7/22568-2015906101/ },
doi = { 10.5120/ijca2015906101 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:52.833736+05:30
%A Manish Soni
%A Bharat Pahadiya
%T Detection and Removal of Vampire Attack in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 7
%P 46-50
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is communication network across low cost, low energy sensor node which sense and collects information around physical environment. Sensing and pervasive computing features of WSN opened up various applications which in turn increased research areas. WSN has been implemented with various areas such as in military, forest, health, inventory etc. Energy is an important factor for sensor node, while there is one new type of attack called vampire attack has been discovered which disables network by consuming battery life of sensor network. The proposed work introduces a new methodology based on energy threshold and packet broadcast threshold of sensor node of network. Solution in previous work was limited to packet forwarding phase only but not work with topology change. The proposed solution is simple and also works with topology change in network.

References
  1. I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci 2001, Wireless sensor networks: a survey, Elsevier Computer Networks.
  2. Jamal N. Al-Karaki Ahmed E. Kamal, Routing Techniques in Wireless Sensor Networks: A Survey.
  3. Rajkumar, Sunitha K R, Dr.H.G.Chandrakanth 2012, A Survey on Security Attacks in Wireless Sensor Network, International Journal of Engineering Research and Applications.
  4. Jaydip Sen, Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses, Innovation Lab, Tata Consultancy Services Ltd.
  5. Wood, A.D. &Stankvic, J.A. 2002 Denial of service in sensor networks. IEEE Computer, Vol. 35, No. 10, pp. 54-62.
  6. Karlof, C. & Wagner, D. 2003 Secure routing in wireless sensor networks: attacks and countermeasures. Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications.
  7. Eugene Y. Vasserman and Nicholas Hopper 2013, Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks. IEEE transactions on mobile computing.
  8. B. Umakanth1, J. Damodhar2 2013, Detection of Energy draining attack using EWMA in Wireless Ad Hoc Sensor Networks, International Journal of Engineering Trends and Technology (IJETT).
  9. V.Subha1, P.Selvi 2014, Defending against vampire attacks in wireless sensor networks, International Journal of Computer Science and Mobile Computing.
  10. V.Sharmila1 2014, Energy Depletion Attacks: Detecting and Blocking in Wireless Sensor Network, International Journal of Computer Science and Mobile Computing.
Index Terms

Computer Science
Information Sciences

Keywords

Vampire attack wireless sensor network DOS Variance Security