We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Vampire Attack Prevention to reduce Node Power Consumption in WSN

by Laxmi Choukiker, Amit Saxena, Manish Manoria
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 11
Year of Publication: 2016
Authors: Laxmi Choukiker, Amit Saxena, Manish Manoria
10.5120/ijca2016908031

Laxmi Choukiker, Amit Saxena, Manish Manoria . Vampire Attack Prevention to reduce Node Power Consumption in WSN. International Journal of Computer Applications. 133, 11 ( January 2016), 13-17. DOI=10.5120/ijca2016908031

@article{ 10.5120/ijca2016908031,
author = { Laxmi Choukiker, Amit Saxena, Manish Manoria },
title = { Vampire Attack Prevention to reduce Node Power Consumption in WSN },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 11 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number11/23829-2016908031/ },
doi = { 10.5120/ijca2016908031 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:53.400272+05:30
%A Laxmi Choukiker
%A Amit Saxena
%A Manish Manoria
%T Vampire Attack Prevention to reduce Node Power Consumption in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 11
%P 13-17
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile unintended network (WSN) area unit self-configuring, individual nodes or routers networks that move concerning freely, organize themselves randomly and area unit reticulated through wireless links that once synchronized, type a dynamic topology. The attackers during this reasonably network area unit simply changed the first routing performance by that the unfinished energy resource of nodes area unit wasted. The nodes in needed battery power for communication and it's terribly crucial concern operate the battery power of nodes with efficiency in network with none interference of aggressor. during this analysis we tend to projected a brand new energy economical routing theme with AODV routing protocol against evil spirit attack to enhance the consistency of information delivery and energy utilization. The projected IPS (Intrusion detection and hindrance System) routing theme is utilizing the energy of mobile nodes. The evil spirit aggressor is flooded the massive range of packets in network due to that ordinary intermediate nodes area unit received that packets and their energy is wasted for receiving these unwanted packets. The projected IPS is known the aggressor by their gratuitous energy consumption of mobile nodes. The network performance in presence of IPS is provides secure routing as adequate traditional routing performance. The evil spirit aggressor information loss existence in presence of IPS is marked zero e.g. the sign of reliable and secures routing. The routing performance is measured through performance matrices and therefore the projected methodology is showing the far better performance as compare to aggressor presence in network.

References
  1. Eugene Y. Vasserman And Nicholas Hopper “Vampire Attacks: Draining Life From Wireless Ad Hoc Sensor Networks” IEEE Transactions On Mobile Computing, Vol. 12, No. 2, February 2013.
  2. Gowrishankar.S, T.G.Basavaraju, Manjaiah D.H, Subir Kumar Sarkar “Issues in Wireless Sensor Networks” July 2 - 4, 2008, London, U.K.
  3. Eugene Y. Vasserman and Nicholas Hopper, “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks”, IEEE Transactions on mobile computing, Vol. 12, No. 2, February 2013.
  4. Ankita Shrivastava, Rakesh Verma “Detection of Vampire Attack in Wireless Ad-hoc Network” international journal of Software & Hardware Research in engineering volume 1 issue jan-2015.
  5. Anoopa S, Sudha S K. “Detection and Control of Vampire Attacks in Ad-Hoc Wireless Networks” Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.01-07.
  6. K.Vanitha,V.Dhivya “A Valuable Secure Protocol to Prevent Vampire Attacks In Wireless Ad Hoc Sensor Networks” IJIRSET Volume 3, Special Issue 3, March 2014.
  7. Gowthami.M, Jessy Nirmal.A.G,P.S.K.Patra “Mitigating Vampire Attack in Wireless Ad-Hoc Sensor Networks”IJARCST Vol. 2 Issue Special 1 Jan-March 2014.
  8. Ambili M. A, Biju Balakrishnan, “Vampire Attack: Detection and Elimination in Wsn” Volume 3 Issue 4 April 2014 ISSN NO 2277.
  9. Kirthika.K, Mr.B.Loganathan, “VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORK –A SURVEY” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 7, July 2014.
  10. P.Rajipriyadharshini,V.Venkatakrishnan,S.Suganya,A.Masanam,“Vampire Attacks Deploying Resources in Wireless Sensor Networks” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 2951-2953.
  11. Savitha.M,Dr. R.Manavalan “Efficient Data Transmission Using Energy Efficient Clustering Scheme for Wireless Ad- Hoc Sensor Network” International Journal of Computer Trends and Technology (IJCTT) – volume 17 number 2 – Nov 2014
  12. http://www.isi.edu/nsnam/ns/tutorial/index.html
Index Terms

Computer Science
Information Sciences

Keywords

Energy Vampire attack WSN AODV routing performance.