CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Prevention of Vampire Attacks in Wireless Sensor Network

by Damayanti D. Pawar, Megha Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 9
Year of Publication: 2016
Authors: Damayanti D. Pawar, Megha Singh
10.5120/ijca2016912214

Damayanti D. Pawar, Megha Singh . Prevention of Vampire Attacks in Wireless Sensor Network. International Journal of Computer Applications. 154, 9 ( Nov 2016), 19-20. DOI=10.5120/ijca2016912214

@article{ 10.5120/ijca2016912214,
author = { Damayanti D. Pawar, Megha Singh },
title = { Prevention of Vampire Attacks in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 9 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number9/26519-2016912214/ },
doi = { 10.5120/ijca2016912214 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:47.596888+05:30
%A Damayanti D. Pawar
%A Megha Singh
%T Prevention of Vampire Attacks in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 9
%P 19-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world of research computing wireless sensor networks are the widely used for various operations. These networks contain number of sensor nodes whose task is to collect data and send it to the data aggregator for further processing. For these type of networks low powered and energy efficient devices are mostly required for the collection of data because of which energy management becomes an important part of them. One of the major problems related to security which is faced by these networks is that of vampire attacks. These attacks are launched by the adversaries in order to drain the energy from the network so as to create denial of services and abruption. This paper focuses on the effects of vampire attacks on wires less sensor networks especially on Dynamic State Routing Protocol (DSP) & Destination-Sequenced Distance-Vector Routing (DSDV) protocols. The methods are also given to prevent the network from these attacks. The results are collected by performing the attacks on actual networking scenario & applying our system to prevent the attacks.

References
  1. Eugene Y. Vasserman, Nicholas Hopper- Vampire attacks: Draining life from wireless Ad-hoc Sensor networks IEEE TRANSACTIONS ON MOBILE COMPUTING VOL.12 NO.2 YEAR 2014
  2. Damayanti D. Pawar and Megha Singh, Dealing with Vampire Attacks: A Survey. . International Journal of Scientific Research and Publications92(16):23-29, April 2014. Published by Foundation of Computer Science, New York, USA.
  3. Yih-Chun Hu, David B. Johnson, and Adrian Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, IEEE workshop on mobile computing systems and applications, 2002.
  4. David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F. Midkiff, Effects of denial-of-sleep attacks on wireless sensor network MAC protocols, 58 (2009), no. 1.
  5. Charles E. Perkins and Pravin Bhagwat, Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers, Conference on communications architectures, protocols and applications, 1994
  6. Gowthami. M, Jessy Nirmal.A.G, P.S.K.Patra, Mitigating Vampire Attack in Wireless Ad-Hoc Sensor Networks
  7. Trupti A Borgamwar , Kanchan Dhote , Review of Resist to Vampire Attack using Wireless Ad-hoc Sensor Network
  8. Tawseef Ahmad Naqishbandi ,Imthyaz Sheriff C, A Resilient Strategy against Energy Attacks in Ad-Hoc WSN and Future IoT
Index Terms

Computer Science
Information Sciences

Keywords

Vampire Attacks Denial of Service Wireless adhoc networks