Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network using PLGP protocol

Authors

  • Gaurav Kawde  BE Scholar, Department of Computer Science Engineering, Rajiv Gandhi College of Engineering and Research, Hingna, Nagpur, Maharashtra, India
  • Safal Prabhukhanolkar  BE Scholar, Department of Computer Science Engineering, Rajiv Gandhi College of Engineering and Research, Hingna, Nagpur, Maharashtra, India
  • Shrinivas Tonpewar  BE Scholar, Department of Computer Science Engineering, Rajiv Gandhi College of Engineering and Research, Hingna, Nagpur, Maharashtra, India
  • Kushagra Belorkar  BE Scholar, Department of Computer Science Engineering, Rajiv Gandhi College of Engineering and Research, Hingna, Nagpur, Maharashtra, India
  • Shyam Kumar Patle  BE Scholar, Department of Computer Science Engineering, Rajiv Gandhi College of Engineering and Research, Hingna, Nagpur, Maharashtra, India
  • Chandu Vaidya  Professor, Department of Computer Science Engineering, Rajiv Gandhi College of Engineering and Research, Hingna, Nagpur, Maharashtra, India

DOI:

https://doi.org/10.32628/CSEIT2390135

Keywords:

Vampire attack, Wireless Ad-Hoc network, power drainage, PLGP, Wireless Sensor Network, Denial of service, Resource depletion ,Routing ,Energy consumption

Abstract

Wireless networks are an ideal research direction in the areas of sensors and pervasive computing. Wireless ad-hoc sensor networks are a new platform in the fields of remote sensing, data collection, analysis, problem solving, and various research studies. They contain nodes that act as transmitters and receivers, and are vulnerable to various attacks and incur various types of loss. Resource exhaustion attacks, once considered just a routing problem, now fall into a new group called "vampire attacks." A resource exhaustion or vampire attack drains a node's batteries, rendering them useless. Vampire attacks are not specific protocols and are hard to spot. This paper examines the identification and protection of resource exhaustion attacks at the routing protocol layer using the PLGP protocols (Parno, Luk, Gaustad, and Perrig). This white paper focuses primarily on detecting and preventing vampire attacks. The proposed method is used to prevent network node exhaustion. This greatly reduces the problem of vampire attacks.

References

  1. Vaibhav kulkarni, Monika Kalane , Chaitali Jadhav, Harshada Chaudhari, Prof. D.N. Gadekar, vampire Att acks: “Intrusion Detection and Efficient Use of Sensor Nodes”. 2015.
  2. Anand M , Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation Protection .
  3. Harpreet Kaur1, Jasmeet Singh Gurm2,Detection of Vampire Attack and prevention in MANET.
  4. Farzana TMrs.Aswathy Babu ,A light weight PLGP based method for mitigating vampire attacks in Wireless Sensor Networks .
  5. Prof. R.K. Krishna Abdul Razak Qureshi, Enhancing Energy Efficiency by Detecting and Protecting from Vampire Attack in Wireless Sensor Networks.
  6. Pavani Potnuri , Bharath Kumar Gowru , Venkateswara Rao Nadakuditi,Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks.
  7. Hesham Abusaimeh , Enhance the Security and Prevent Vampire Attack on Wireless Sensor Networks using Energy and Broadcasts Threshold Values.
  8. Eugene Y. Vasserman∗and Nicholas Hopper, Vampire attacks:Draining life from wireless ad-hoc sensor networks published on feb 2013(pages 318-332).
  9. R. Isaac Sajan, J. Jasper and E. Arun, Surveying the Effect of Vampire Attack in Wireless Ad-hoc Sensor Networks.
  10. Harpreet Kaur1, Jasmeet Singh Gurm2, Time Based Detection and Prevention of Vampire Attacks in Wireless Sensor Network.
  11. Anoopa S,Sudha S K, Detection and Control of Vampire Attacks in Ad-Hoc Wireless Networks.
  12. Rohit Sangwan, Dr. Manoj Duhan, Sachin Dahiya, Energy Consumption Analysis of Ad hoc Routing Protocols for Different Energy Models in MANET
  13. Cauvery Raju, Defending Against Resource Depletion Attacks in Wireless Sensor Networks.
  14. Vijayanand, R. Muralidharan, Overcome Vampire Attacks problem in wireless ad-hoc sensor network by using Distance Vector Protocols.
  15. Devakumar M. Rajesh Khanna , Vampire Attacks in Wireless Ad-Hoc Sensor Network for Sheltering Data Packets.
  16. Chris Karloff and David Wager “Secure Routing in Wireless Sensor Networks: Attacks and countermeasures” Proc. IEEE Int‟l workshop sensor network protocols and applications, 2003.
  17. H. Chan and A. Perrig, “Security and Privacy in Sensor Networks,” Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
  18. M. Tubaishat and S. Madria, “Sensor Networks: An Overview,” IEEE Potentials, Vol. 22, No. 2, 2003, pp. 20-23. doi:10.1109/MP.2003.1197877
  19. J. Deng, R. Han, and S. Mishra, “Maximum Lifetime Routing in Wireless Sensor Networks,” IEEE/ACM Trans. Networking, vol 12. 4, pp. 609-619, Aug. 2004.
  20. B. Przydatek, D. Song, and A. Perrig. SIA:Secure information aggregation in sensor network. In ACM SenSys, Nov 2003.
  21. Parno, Mark Luk, Evan Gaustad, andAdrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT,2006.

Downloads

Published

2023-02-28

Issue

Section

Research Articles

How to Cite

[1]
Gaurav Kawde, Safal Prabhukhanolkar, Shrinivas Tonpewar, Kushagra Belorkar, Shyam Kumar Patle, Chandu Vaidya, " Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network using PLGP protocol" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 1, pp.195-199, January-February-2023. Available at doi : https://doi.org/10.32628/CSEIT2390135