Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and Protection - International Journal of Trend in Scientific Research and Development

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Tuesday, 29 January 2019

Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and Protection


Wireless Sensor Networks WSNs in todays world are the means of communication. These contain nodes that act as transmitter and receivers are prone to different attacks leading to different types of losses. The resource depletion attack that is called vampire attack drains out the energy from the nodes leaving them useless. These attacks are protocol compliant, they are easy to implement. Since they are orthogonal in nature they can easily intrude into any routing protocol. They affect the entire network causing large loss of energy and A vampire attack is caused by the malicious node on the decentralized ad hoc wireless network. The paper analyses how protocols faces these attacks. Vampire attacks are not protocol specific rather uses its compliant message. The current security measures to prevent these attacks are been reviewed along with result of simulation of representative protocols in the presence of a vampire attack is been presented. The paper also describes how the existing sensor network protocol is been modified for protection from the vampire attacks for which PLGP Parno, Luk, Gaustad and Perrig solution is also been proposed. 


by Anand. M "Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and Protection"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd20300.pdf

Paper URL: https://www.ijtsrd.com/computer-science/computer-network/20300/detection-of-vampire-attacks-in-ad-hoc-wireless-sensor-network-evaluation-and-protection/anand-m

call for paper mathematics, mathematics journal, ugc approved journals in mathemetics

No comments:

Post a Comment

Ad