International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 228 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 7.3 / 10


     

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari


Abstract: The wireless technologies are growing due to less dependencies on fixed infrastructure. Wireless sensor network is applicable in various small scale application developments to large scale application development. WSN provide the missing connections among Internet and physical world. The Vampire is a model of malicious activity that is not specific to any specific protocol. That relies on properties of many popular classes of routing protocols. Vampire attack is transmission of a message that causes energy consumption of the network rather than honest node transmitted a message to same destination. The introduced methodology for detection and prevention of Vampire attack is developed using time calculation of sender and receiver when the packet is transferred. The implementation and execution of the proposed concept is implemented through AODV routing protocol modification. Additionally the network simulator 2 i. e. NS-2 is used for simulation of security scheme. The experimental results show the adoptable performance of the algorithm and improve throughput, packet delivery ratio, and energy consumption. Additionally reduces the end to end delay between communicating nodes


Keywords: AODV, NS-2, Routing Protocol, RREQ, RREP, Security, Vampire Attack, Wireless Sensor Network


Edition: Volume 6 Issue 6, June 2017


Pages: 1717 - 1722




Text copied to Clipboard!
Rajani Jagle, Dr. Abhay Kothari, "Vampire Attack Detection and Prevention to Defending WSN Based Application", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1717-1722, https://www.ijsr.net/getabstract.php?paperid=ART20174013

Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article
Top