International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 271 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 7.3 / 10


     

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari


Abstract: The wireless technologies are growing due to less dependencies on fixed infrastructure. Wireless sensor network is applicable in various small scale application developments to large scale application development. WSN provide the missing connections among Internet and physical world. The Vampire is a model of malicious activity that is not specific to any specific protocol. That relies on properties of many popular classes of routing protocols. Vampire attack is transmission of a message that causes energy consumption of the network rather than honest node transmitted a message to same destination. The introduced methodology for detection and prevention of Vampire attack is developed using time calculation of sender and receiver when the packet is transferred. The implementation and execution of the proposed concept is implemented through AODV routing protocol modification. Additionally the network simulator 2 i. e. NS-2 is used for simulation of security scheme. The experimental results show the adoptable performance of the algorithm and improve throughput, packet delivery ratio, and energy consumption. Additionally reduces the end to end delay between communicating nodes


Keywords: AODV, NS-2, Routing Protocol, RREQ, RREP, Security, Vampire Attack, Wireless Sensor Network


Edition: Volume 6 Issue 6, June 2017


Pages: 1717 - 1722



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Rajani Jagle, Dr. Abhay Kothari, "Vampire Attack Detection and Prevention to Defending WSN Based Application", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1717-1722, https://www.ijsr.net/getabstract.php?paperid=ART20174013, DOI: https://www.doi.org/10.21275/ART20174013



Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top