Defending Against Resource Depletion Attacks in Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 104

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

One of the major challenges wireless sensor networks face today is security. Wireless Sensor networks are vulnerable to security attacks due to the broadcast nature of the transmission medium. Energy is the most essential resource for sensor nodes. Resource depletion attacks means draining the energy of the nodes by introducing routing loops and stretching the path during packet transmission. Routing protocols are vulnerable to resource depletion attacks. This attack is grouped under vampire attacks. Vampire attacks include carousel and stretch attack. Vampire attacks not only affect a single node but they bring down the entire system by depleting the energy. Secure packet traversal algorithm is developed to avoid vampire attacks. The proposed algorithm increases the network lifetime.

Keywords: Denial of Service, Routing, Security, Vampire Attacks, Wireless Sensor Networks

Edition: Volume 3 Issue 11, November 2014

Pages: 590 - 595

Share this Article

How to Cite this Article?

Cauvery Raju, "Defending Against Resource Depletion Attacks in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14967, Volume 3 Issue 11, November 2014, 590 - 595

Enter Your Email Address




Similar Articles with Keyword 'Routing'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 991 - 996

Review on Various Data Gathering Techniques Using Artificial Intelligence

Varsha Kumari, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Vampire Attacks'

Downloads: 115

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 314 - 317

Vampire Attack: Energy Efficient Trust Based Solution

Pritam M. Channawar, Dr. Y. V.Chavan

Share this Article

Downloads: 119

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2070 - 2074

A Survey on Energy Depletion Attacks in Wireless Sensor Networks

Dr. N. Geethanjali, E. Gayathri

Share this Article

Similar Articles with Keyword 'Wireless Sensor Networks'

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Denial'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Similar Articles with Keyword 'Service'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1213 - 1218

Sentiment Analysis of Twitter Data to Analyze the Acceptance of Aadhaar

Aarushi Thakral, Vasantha W. B.

Share this Article



Top