CFP last date
20 May 2024
Reseach Article

Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks

by Priya S. Gosavi, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 9
Year of Publication: 2016
Authors: Priya S. Gosavi, B. M. Patil
10.5120/ijca2016910424

Priya S. Gosavi, B. M. Patil . Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks. International Journal of Computer Applications. 144, 9 ( Jun 2016), 1-4. DOI=10.5120/ijca2016910424

@article{ 10.5120/ijca2016910424,
author = { Priya S. Gosavi, B. M. Patil },
title = { Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 9 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number9/25204-2016910424/ },
doi = { 10.5120/ijca2016910424 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:47:33.997547+05:30
%A Priya S. Gosavi
%A B. M. Patil
%T Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 9
%P 1-4
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ad-hoc wireless networks are dynamic in nature. Ad-hoc networks are not depends on any predefined infrastructure. Whenever there is need of communication at that point these network can be deployed. In this paper we discuss Vampire attacks. All protocols susceptible for vampire attack. Vampire attacks are very easy to carry out throughout the network and difficult to detect. In this paper we discuss a method to mitigate vampire attacks. Then we compare new method with existing protocol and Beacon Vector routing. And we come to the conclusion that new protocol is better as it detect and prevent from vampire attack.

References
  1. Anthony D. Wood and John A. Stankovic, Denial of service in sensor networks, Computer35 (2002), no. 10.
  2. Frank Stajano and Ross Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, International workshop on security pdecisions", Journal of Systems and Software, 2005, in press.
  3. David R. Raymond, Randy C. Marchany, Michael I. Brownfield, and Scott F.Midkiff, Effects of denial-of-sleep attacks on wireless .sensor network MAC protocols, IEEE transaction on vehicular technology.
  4. Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, and Jennifer Rexford, Path-quality monitoring in the presence of adversaries, SIGMETRICS,2008.
  5. Mina Guirguis, Azer Bestavros, Ibrahim Matta, and Yuting Zhang, Reduction of quality attacks on internet and end system, INFOCOM 2005.
  6. Aleksandar Kuzmanovic and Edward W. Knightly, Low-rate TCPtargeted denial of service attacks: the shrew vs. the mice and elephants, SIGCOMM, 2003.
  7. Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, and Kai Hwang, HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DoS attacks, Networking and mobile computing, 2005.
  8. Xiapu Luo and Rocky K. C. Chang, On a new class of pulsing denial of-service attacks and the defense, NDSS, 2005.
  9. Haibin Sun, John C. S. Lui, and David K. Y. Yau, Defending against low-rate TCP attacks: dynamic detection and protection, ICNP, 2004.
  10. Guang Yang, M. Gerla, and M.Y. Sanadidi, Defense against low-rate TCP-targeted denial-of-service attacks, ISCC, 2004
  11. Jing Deng, Richard Han, and Shivakant Mishra, Defending against path based DoS attacks in wireless sensor networks, ACM workshop on security of ad hoc and sensor networks, 2005.
  12. Packet leashes: A defense against wormhole attacks in wireless hoc networks, INFOCOM, 2003.
  13. Rushing attacks and defense in wireless adhoc network routing protocols, WiSE, 2003.
  14. Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006.
  15. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, MobiCom, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

PLGP EDSA BVR PLGP