CFP last date
20 December 2024
Reseach Article

A Mitigation Approach to Protect Wireless Sensor Networks over Vampire Attack

by Mohit Raikwar, Prakash Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 159 - Number 7
Year of Publication: 2017
Authors: Mohit Raikwar, Prakash Mishra
10.5120/ijca2017912994

Mohit Raikwar, Prakash Mishra . A Mitigation Approach to Protect Wireless Sensor Networks over Vampire Attack. International Journal of Computer Applications. 159, 7 ( Feb 2017), 25-28. DOI=10.5120/ijca2017912994

@article{ 10.5120/ijca2017912994,
author = { Mohit Raikwar, Prakash Mishra },
title = { A Mitigation Approach to Protect Wireless Sensor Networks over Vampire Attack },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 159 },
number = { 7 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume159/number7/27015-2017912994/ },
doi = { 10.5120/ijca2017912994 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:10.061751+05:30
%A Mohit Raikwar
%A Prakash Mishra
%T A Mitigation Approach to Protect Wireless Sensor Networks over Vampire Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 159
%N 7
%P 25-28
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor network is collection of sensor nodes deployed with the aims to sense and process particular attributes. It is kind of wireless network uses radio communication technique for transmission purpose. Sensor nodes integrate several different component such memory, battery, sensor, processing unit etc. Wide range of applications makes it popular among the users and researchers are acquiring it as the research domain. This paper aims to explore the issues in sensor networks and proposed a methodology to overcome the same. Vampire attack is one of severe security threat attacks on the energy of sensor node aims to degrade the life and make it into dying condition. This research paper implements a mechanism to detect and mitigate the impact of sensor networks. The complete solution is implemented using NS-2.35 simulator and evaluated on basis of Throughput and Energy Consumption.

References
  1. Sen, J., “A survey on wireless sensor network security,” published in “International Journal of Communication Networks and Information Security (IJCNIS)”, Vol 1, No 2, August 2009, pp. 55-78.
  2. Sangwan,A., Sindhu,D., Singh, K., “A Review of various security protocols in Wireless Sensor Network”, IJCTA, ISSN:2229-6093, vol. 2 (4), july-august-2011, pp.790-797.
  3. Gowrishankar.S , Basavaraju, T.G., Manjaiah D.H, Sarkar, S., “Issues in Wireless sensor networks” In Proceedings of the World Congress on Engineering vol I, 2008.
  4. Pathan,A.S.K., Lee, H.W., Hong, C.S. “Security in Wireless Sensor Networks: Issues and Challenges ” ICACT ISBN 89-5519-129-4, pp 1043-1048, 2006.
  5. Balakrishna, R., Rajeshwar Rao, U., Geetahanjali, N., “Performance issues on AODV And AOMDV for MANETs”, published in “International journal of Computer Science and Information (IJCSIT),” vol. 1 (2), 2010, pp. 38-43.
  6. C.E. Perkins and E.M. Royer, “The Ad Hoc On-demand Distance Vector Protocol”, 2000 pp. 173-219.
  7. Panday, M., Shriwastava, A., “A Review on security Issues of AODV routing protocol for MANETs”, IOSR Journal of Computer Engineering(IOSR-JCE), e-ISSN:2278-0661, p-ISSN:2278-8727 vol. 14, Issue 5 (Sep. - Oct. 2013), pp.127-134.
  8. C.E. Perkins and E.M. Royer, “The Ad Hoc On-demand Distance Vector Protocol”, 2000 pp. 173-219.
  9. Y. Hu and A. Perrig, "A Survey Of Secure Wireless Ad Hoc Routing", published in IEEE Security & Privacy, 2004. pp. 28-39,
  10. Eugene Y. Vasserman, Nicholas Hopper, "Vampire attacks: draining life from wireless ad-hocsensor networks", IEEE Trans on mobile computingvol, vol. 12, no. 2, 2013.
  11. David R. Raymond, Randy C. Marchany, Michael I. Brownfield, Scott F. Midkiff, "Effects of denial-of-sleep attacks on wireless sensor network MAC protocols", IEEE Transactions on Vehicular Technology, vol. 58, no. 1, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Vampire Attack WSN AODV