CFP last date
20 January 2025
Reseach Article

Secure Transmission against Vampire Attack using Wireless Adhoc Sensor Network

by Shubhangi Pokharkar, Veeresh G. Kasabegoudar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 3
Year of Publication: 2015
Authors: Shubhangi Pokharkar, Veeresh G. Kasabegoudar
10.5120/ijca2015905870

Shubhangi Pokharkar, Veeresh G. Kasabegoudar . Secure Transmission against Vampire Attack using Wireless Adhoc Sensor Network. International Journal of Computer Applications. 125, 3 ( September 2015), 39-43. DOI=10.5120/ijca2015905870

@article{ 10.5120/ijca2015905870,
author = { Shubhangi Pokharkar, Veeresh G. Kasabegoudar },
title = { Secure Transmission against Vampire Attack using Wireless Adhoc Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 3 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number3/22416-2015905870/ },
doi = { 10.5120/ijca2015905870 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:15:05.569905+05:30
%A Shubhangi Pokharkar
%A Veeresh G. Kasabegoudar
%T Secure Transmission against Vampire Attack using Wireless Adhoc Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 3
%P 39-43
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Adhoc wireless networks are interest among the researches in sensing and ubiquitous computing. The security focused especially on denial of communication at the routing or transmission of data using protocol. Vampire attacks are stubborn to detect, disastrous and are easy to carry out using as few as one network wide energy usage. These affect on OS and suddenly break the function. Therefore to oppose this situation, in this paper a secure transmission method proposed which will protect the system and alternative protocols solutions that will be avoiding some sort of problems which are caused by vampire attack. This technique transfers the data with shortest path and consumes less energy. For that some network modules and energy usage modules in the proposed technique are to be created in which each node in the network broadcasts data so that each node is having its specific user id and connected to each other. Also, the node creates a topology without loss of data with shortest path and hence we get the required results at the destination end. In this paper implemented such a scheme and all results have been presented in the subsequent sections.

References
  1. Farooq Anjum and Petros Mouchtaris, Security for Wireless Adhoc Network, John Wiley & Sons Inc, 2007.
  2. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, “Ariadne: a secure on demand routing protocol for ad hoc network,” MobiCom, 2002.
  3. Manel Guerrero Zapata and N. Asokan,“Securing adhoc routing protocol,” WiSE, 2002.
  4. Bryan Parno,Mark Luk,Evan Gaustad ,and Adrian perrig,“Secure sensor network routing: clean slate approach,”CoNEXT, 2006
  5. David B. Johnson, David A.Maltz, and Josh Broch DSR, “The dynamic source routing protocol for multihop wireless adhoc sensor network”, adhoc Networking, 2001.
  6. Thomas H.Clausen and Philippe jacquet,“Optimized link state routing protocol,”OLS), 2003
  7. Haowen Chan and Adrian Perrig,“Security and privacy in sensor Network,” Computer, vol. 36, no. 10. 2003.
  8. Gergely Acs, Levente Buttyan, Istvan Vajda,“Provably secure on demand source routing in mobile ad hoc network”, IEEE Transaction on Mobile Computing vol. 05, no.11, 2006.
  9. John Bellard and Stefan Savage, “802.11denial of service attack: real vulnerabilities and practical solution,” USENIX security, 2003.
  10. Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer, “Strong authentication for RFID system using the AES algorithm”, CHES, 2004.
  11. Sheetalkumar Doshi, Shweta Bhandare, and Timothy X.Brown, “An on demand minimum energy routing for wireless ad hoc network,” ACM SIDMOBILE Mobile Computing and Communication Review, vol. 6, no. 3, 2006.
  12. Rahul C.Shah and Jan M. Rabaey, “Energy aware Routing for low energy ad hoc sensor network”, WCNC, 2002.
  13. Vilkan Rodopu and Teresa H. Meng, “Minimum energy mobile wireless network”, IEEE Journal on Selected Area in Communication, vol. 17, no.8, 1999.
  14. R.Govindan and A.Reddy, “An analysis of internet inter-domain topology and route stability,” INFOCOM, 1997.
  15. Jiao Wen- Cheng, Peng Jing and Zheng Jain-Ling (2010), “Researches and improvement of AODVprotocol in ad hoc network,” Wireless Communication Networking and Mobile Computing (WiCom), 2010.
  16. S. B. Lee and Y.H. Choi, “A secure alternate path routing in sensor network”, in Proc. of the Computer Communication, vol. 30, pp.153-165, 2006.
  17. C. Karlof and D. Wagner, “Secure routing in wireless sensor network: Attack and Countermeasures”, University of California at Barkley. Tech. rep. F 33615-01-c-1895.
  18. Frank Stajano and Ross Anderson, The resurrecting Duckling,“ security issues for ad hoc wireless network”, International Workshop on Security Protocol,1999.
Index Terms

Computer Science
Information Sciences

Keywords

Vampire attacks Stubborn Disastrous broadcasts