alexa Mitigation of Vampire Attacks in Wireless Sensor Netwo
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

Mitigation of Vampire Attacks in Wireless Sensor Networks

JM.Nageswara Prasadhu1, D.V.Bharath2 and G.Lakshmikanth3
  1. PG Student, Dept. of CSE, Sree Rama Engineering College, Tirupathi, Andhra Pradesh, India
  2. Assistant Professor, Dept. of CSE, Sree Rama Engineering College, Tirupathi, Andhra Pradesh, India
  3. Associate Professor & HOD, Dept. of CSE, Sree Rama Engineering College, Tirupathi, Andhra Pradesh, India
Related article at Pubmed, Scholar Google
 

Abstract

Ad-hoc sensor network and routing data in them is a most significant research area. There are lots of protocols established to protect from DOS attack, but it is not perfectly possible. One such DOS attack is Vampire attack. This vampire attack is a resource depletion attacks at the routing protocol layer, which permanently disconnect the networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather depend on the characteristics of many popular classes of routing protocols. This project illustrates a technique to tolerate the attack by employing the Cluster Head. In case of each Vampire attack, the Cluster Head employs in this situation and distributes the packet to destination without dropping the packet. Thus give a successful and reliable message delivery even in case of Vampire attack. In the worst case, a single Vampire can increase network wide energy usage by a factor of O(N), where N is the number of network nodes.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords