International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

The wireless technologies are growing due to less dependencies on fixed infrastructure. Wireless sensor network is applicable in various small scale application developments to large scale application development. WSN provide the missing connections among Internet and physical world. The Vampire is a model of malicious activity that is not specific to any specific protocol. That relies on properties of many popular classes of routing protocols. Vampire attack is transmission of a message that causes energy consumption of the network rather than honest node transmitted a message to same destination. The introduced methodology for detection and prevention of Vampire attack is developed using time calculation of sender and receiver when the packet is transferred. The implementation and execution of the proposed concept is implemented through AODV routing protocol modification. Additionally the network simulator 2 i.e. NS-2 is used for simulation of security scheme. The experimental results show the adoptable performance of the algorithm and improve throughput, packet delivery ratio, and energy consumption. Additionally reduces the end to end delay between communicating nodes

Keywords: AODV, NS-2, Routing Protocol, RREQ, RREP, Security, Vampire Attack, Wireless Sensor Network

Edition: Volume 6 Issue 6, June 2017

Pages: 1717 - 1722


How to Cite this Article?

Rajani Jagle, Dr. Abhay Kothari, "Vampire Attack Detection and Prevention to Defending WSN Based Application", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174013, Volume 6 Issue 6, June 2017, 1717 - 1722

29 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'AODV'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2103 - 2108

Secure Broadcasting Probability to Enhance Mobile Ad-hoc Network Using NCPR

Kajal Kunte, Navnath Kale

Share this article



Similar Articles with Keyword 'NS-2'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1896 - 1902

HSR: A New Lightweight Hybrid Source Routing Protocol for Mobile Ad Hoc Networks

Varun Pandey, Somesh Dewangan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1187 - 1192

Effect of Load and Threshold Variation on Performance of RED: Random Early Detection

Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1717 - 1722

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 350 - 352

Implementation, Detection and Prevention of Black hole Attack for Mobile Ad-hoc Network Scenario using NS-2

Raghvendra Prasad, Kuntal Barua

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1590 - 1592

A Review Paper on Performance of Routing Protocols in NS-2

Rozy Rana, Kanwal Preet Singh

Share this article



Similar Articles with Keyword 'Routing Protocol'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015

Pages: 2448 - 2452

Reliable and Rapid Routing Configurations for Network Recovery

William Asiedu K. O. Boateng

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1492 - 1499

Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique

Vinay Rana, Rani, Ravi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1978 - 1982

Application of Graph Theory in DTN Routing

Madan H. T., Shabana Sultana

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1548 - 1552

Energy Efficient Hierarchical Protocols in Wireless Sensor Networks

Vaishali P Bawage, Deepak C Mehetre

Share this article



Similar Articles with Keyword 'RREQ'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1972 - 1977

Energy Efficient Routing Protocol in MANET

Nikitha V Suvarna, Chandra Naik

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1717 - 1722

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1158 - 1164

An Optimal Path Determination of Moving Beacons Using Localized Directional Routing Protocol in Mobile Adhoc Network

Kajal K.Kapoor, R. S. Mangrulkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article



Similar Articles with Keyword 'RREP'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1972 - 1977

Energy Efficient Routing Protocol in MANET

Nikitha V Suvarna, Chandra Naik

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1717 - 1722

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1956 - 1959

Performance Analysis of Black Hole Attack with AODV using Different No. of Nodes in VANET

Bharti, D. P. Dwivedi

Share this article



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article



Similar Articles with Keyword 'Vampire Attack'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 590 - 595

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1717 - 1722

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2070 - 2074

A Survey on Energy Depletion Attacks in Wireless Sensor Networks

Dr. N. Geethanjali, E. Gayathri

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1065 - 1069

Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network

Jitendra R. Patil, Manish Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 314 - 317

Vampire Attack: Energy Efficient Trust Based Solution

Pritam M. Channawar, Dr. Y. V.Chavan

Share this article



Similar Articles with Keyword 'Wireless Sensor Network'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2660 - 2664

Coverage Hole Detection in Wireless Sensor Networks

Rakesh Kumar, Sakshi Dhingra

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this article
Top