Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network using PLGP protocol
DOI:
https://doi.org/10.32628/CSEIT2390135Keywords:
Vampire attack, Wireless Ad-Hoc network, power drainage, PLGP, Wireless Sensor Network, Denial of service, Resource depletion ,Routing ,Energy consumptionAbstract
Wireless networks are an ideal research direction in the areas of sensors and pervasive computing. Wireless ad-hoc sensor networks are a new platform in the fields of remote sensing, data collection, analysis, problem solving, and various research studies. They contain nodes that act as transmitters and receivers, and are vulnerable to various attacks and incur various types of loss. Resource exhaustion attacks, once considered just a routing problem, now fall into a new group called "vampire attacks." A resource exhaustion or vampire attack drains a node's batteries, rendering them useless. Vampire attacks are not specific protocols and are hard to spot. This paper examines the identification and protection of resource exhaustion attacks at the routing protocol layer using the PLGP protocols (Parno, Luk, Gaustad, and Perrig). This white paper focuses primarily on detecting and preventing vampire attacks. The proposed method is used to prevent network node exhaustion. This greatly reduces the problem of vampire attacks.
References
- Vaibhav kulkarni, Monika Kalane , Chaitali Jadhav, Harshada Chaudhari, Prof. D.N. Gadekar, vampire Att acks: “Intrusion Detection and Efficient Use of Sensor Nodes”. 2015.
- Anand M , Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation Protection .
- Harpreet Kaur1, Jasmeet Singh Gurm2,Detection of Vampire Attack and prevention in MANET.
- Farzana TMrs.Aswathy Babu ,A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks .
- Prof. R.K. Krishna Abdul Razak Qureshi, Enhancing Energy Efficiency by Detecting and Protecting from Vampire Attack in Wireless Sensor Networks.
- Pavani Potnuri , Bharath Kumar Gowru , Venkateswara Rao Nadakuditi,Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks.
- Hesham Abusaimeh , Enhance the Security and Prevent Vampire Attack on Wireless Sensor Networks using Energy and Broadcasts Threshold Values.
- Eugene Y. Vasserman∗and Nicholas Hopper, Vampire attacks:Draining life from wireless ad-hoc sensor networks published on feb 2013(pages 318-332).
- R. Isaac Sajan, J. Jasper and E. Arun, Surveying the Effect of Vampire Attack in Wireless Ad-hoc Sensor Networks.
- Harpreet Kaur1, Jasmeet Singh Gurm2, Time Based Detection and Prevention of Vampire Attacks in Wireless Sensor Network.
- Anoopa S,Sudha S K, Detection and Control of Vampire Attacks in Ad-Hoc Wireless Networks.
- Rohit Sangwan, Dr. Manoj Duhan, Sachin Dahiya, Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy Models in MANET
- Cauvery Raju, Defending Against Resource Depletion Attacks in Wireless Sensor Networks.
- Vijayanand, R. Muralidharan, Overcome Vampire Attacks problem in wireless ad-hoc sensor network by using Distance Vector Protocols.
- Devakumar M. Rajesh Khanna , Vampire Attacks in Wireless Ad-Hoc Sensor Network for Sheltering Data Packets.
- Chris Karloff and David Wager “Secure Routing in Wireless Sensor Networks: Attacks and countermeasures” Proc. IEEE Int‟l workshop sensor network protocols and applications, 2003.
- H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
- M. Tubaishat and S. Madria, “Sensor Networks: An Overview,” IEEE Potentials, Vol. 22, No. 2, 2003, pp. 20-23. doi:10.1109/MP.2003.1197877
- J. Deng, R. Han, and S. Mishra, “Maximum Lifetime Routing in Wireless Sensor Networks,” IEEE/ACM Trans. Networking, vol 12. 4, pp. 609-619, Aug. 2004.
- B. Przydatek, D. Song, and A. Perrig. SIA:Secure information aggregation in sensor network. In ACM SenSys, Nov 2003.
- Parno, Mark Luk, Evan Gaustad, andAdrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT,2006.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.