alexa Securing Data Packets from Vampire Attacks in Wireless
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Securing Data Packets from Vampire Attacks in Wireless Ad-Hoc Sensor Network

Mr.M.Rajesh Khanna1, S.Divya2, Dr.A.Rengarajan3
  1. Ph.D Scholar, Department of Information Technology, Vel Tech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai, India
  2. PG Scholar, Department of Information Technology, Vel Tech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai, India
  3. Professor, Department of Computer Science and Engineering, Vel Tech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai, India
Related article at Pubmed, Scholar Google
 

Abstract

Wireless Ad-hoc Sensor Network is an emerging platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. These attacks are not specific to any protocol, but rather rely on the properties of many popular classes of routing protocols. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N is the number of network nodes. Methods to detect and secure data packets from vampires during the packet forwarding phase is discussed.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords