International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 119 | Views: 135

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

A Survey on Energy Depletion Attacks in Wireless Sensor Networks

Dr. N. Geethanjali | E. Gayathri

Abstract: Wireless Ad Hoc Sensor Networks provide promising applications that depend on sensing. They are widely used applications in the real world for environment monitoring, studying wildlife habitat, observing troop deployment in military, studying factor performance and so on. These networks are used in both military and civilian applications. They became indispensable for some organizations and people for day to day operations. Therefore 100 % availability of the network is crucial for maximum benefits. When the availability of the network goes down, it has potential risks such as production loss, loss of lives, environmental disasters and power outages. As the nodes in WSN are resource constrained, it is essential that they do utilize energy efficiently. When the energy is drained, the network life is reduced. This is the truth that has attracted adversaries to launch attacks for depleting power. Such attacks drain life from WSNs. Recently Vasserman and Hopper [1] explored resource depletion attacks and prevention measures in Wireless Ad Hoc Sensor Networks. Such attacks were named vampire attacks that are made based on the vulnerabilities of routing protocols. As the availability is of network is crucial for underlying applications which are machine critical in nature, this research has assumed importance. From the initial review of literature the following research objectives are conceived. Research Objectives To propose and implement a novel protocol for Wireless Ad Hoc Sensor Network which is robust to vampire attacks that drain life from the network thus reducing the availability of network. To propose mechanisms for deriving damage bounds and defenses for topology discovery which will help in evicting vampires. This will make a satisfactory solution. To simulate the protocol using NS2 in order to demonstrate the proof of concept and compare the results with existing approaches. Reference Eugene Y. Vasserman and Nicholas Hopper, Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.12, NO.2, FEBRUARY 2013, p1-15.

Keywords: depletion, energy, wireless sensor networks

Edition: Volume 3 Issue 9, September 2014,

Pages: 2070 - 2074

How to Download this Article?

Type Your Email Address below to Download the Article PDF

How to Cite this Article?

Dr. N. Geethanjali, E. Gayathri, "A Survey on Energy Depletion Attacks in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 2070-2074,

Similar Articles with Keyword 'depletion'

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 590 - 595

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, Nepal, Volume 4 Issue 11, November 2015

Pages: 1220 - 1226

Government Roadmap for IPv4 to IPv6 Network Migration: Case of Nepal

Babu Ram Dawadi [3] | Ananda Raj Khanal

Share this Article