International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017


Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle | Dr. Abhay Kothari


Abstract: The wireless technologies are growing due to less dependencies on fixed infrastructure. Wireless sensor network is applicable in various small scale application developments to large scale application development. WSN provide the missing connections among Internet and physical world. The Vampire is a model of malicious activity that is not specific to any specific protocol. That relies on properties of many popular classes of routing protocols. Vampire attack is transmission of a message that causes energy consumption of the network rather than honest node transmitted a message to same destination. The introduced methodology for detection and prevention of Vampire attack is developed using time calculation of sender and receiver when the packet is transferred. The implementation and execution of the proposed concept is implemented through AODV routing protocol modification. Additionally the network simulator 2 i. e. NS-2 is used for simulation of security scheme. The experimental results show the adoptable performance of the algorithm and improve throughput, packet delivery ratio, and energy consumption. Additionally reduces the end to end delay between communicating nodes


Keywords: AODV, NS-2, Routing Protocol, RREQ, RREP, Security, Vampire Attack, Wireless Sensor Network


Edition: Volume 6 Issue 6, June 2017,


Pages: 1717 - 1722


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Rajani Jagle, Dr. Abhay Kothari, "Vampire Attack Detection and Prevention to Defending WSN Based Application", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1717-1722, https://www.ijsr.net/get_abstract.php?paper_id=ART20174013

Similar Articles with Keyword 'AODV'

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita [125] | Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty | Manimozhi Iyer

Share this Article
Top