International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Vampire Attack: Energy Efficient Trust Based Solution

Pritam M. Channawar, Dr. Y. V.Chavan

In sensing and common computing ad hoc low-power wireless networks are an exciting research direction. Earlier security scheme in this area has focused mainly on denial of communication at the routing or medium access control levels. This paper redefines resource depletion attacks at the routing protocol layer. This attack permanently disables networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but depend on the properties of many popular classes of routing protocols. We discussed all protocols are susceptible to Vampire attacks, which are dangerous, difficult to detect, and are very easy to carry out using very few such as one malicious insider sending only protocol-compliant messages. With this, a single Vampire can increase network-wide energy usage by a factor of O (N), here N in the number of network nodes in the network. Proposed algorithm finds the solution for carousal attack and stretch attack to achieve better security. Also trust based energy efficient technique is adopted to keep network active in vampire attack, it also help to detect and avoid malicious nodes in the routing phase.

Keywords: Security, routing, ad hoc networks, medium access control, wireless networks

Edition: Volume 3 Issue 12, December 2014

Pages: 314 - 317


How to Cite this Article?

Pritam M. Channawar, Dr. Y. V.Chavan, "Vampire Attack: Energy Efficient Trust Based Solution", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14343, Volume 3 Issue 12, December 2014, 314 - 317

27 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Similar Articles with Keyword 'routing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2681 - 2687

Power Efficient QoS and Failover Routing in Tethernet

Kavita Sharma, Puneet Rani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1536 - 1542

Survey on Energy Efficient Routing Protocol in Wireless Sensor Network

Poonam Kudale, M. D. Ingle

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Similar Articles with Keyword 'ad hoc networks'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this article

Similar Articles with Keyword 'medium access control'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1193 - 1198

MAC Algorithm for Cognitive Radio Networks Based on Traffic Type

Ashwini S, Manjul Krishna Gupta

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 597 - 599

Lifetime of MANET Networks Increased Using Cooperative DEL-CMAC Protocol by Parallel Communication

Saradha Jayaraj, M. Basavaraju

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2118 - 2123

QoS Support for Cross-Layer Scheduling Algorithm in Wireless Networks

K. Raghavendra Rao, Vadipina Amarnadh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1471 - 1475

Performance Improvement In MANET By Using A Modified BEB Algorithm

Aparna S. Mankar, Mangla S. Madankar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 314 - 317

Vampire Attack: Energy Efficient Trust Based Solution

Pritam M. Channawar, Dr. Y. V.Chavan

Share this article

Similar Articles with Keyword 'wireless networks'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1590 - 1592

A Review Paper on Performance of Routing Protocols in NS-2

Rozy Rana, Kanwal Preet Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1828 - 1830

Distributed Cooperative Caching in Social Wireless Networks

P. Suman Prakash, M. Naga Prasad

Share this article

Top