International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 134

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015


Vampire Attacks: Draining Life from Wireless Ad-hoc Sensor Networks

Trupti Pawar | Jyoti Patil [3]


Abstract: Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This work explores resource depletion attacks, which permanently disable networks by quickly draining nodes battery power. These Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. Two types of vampire attacks are considered. In the carousel attack, attackers introduce some packet within a route as a sequence of loops and in the stretch attack, attackers construct falsely long routes. Whenever these two attacks are occurred the energy consumption is more as compared to the normal communication and data will reach very late to the destination. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. Mitigation method used in this work is based on time, that is time taken by carousel and stretch attacks is compared with the time of normal communication and if the time in both the attacks is greater, than the new path is formed. Results shows, that secured transmission is done in the nodes by overcoming the vampire attacks, where the data travels in the honest route by mitigating the vampire attacks.


Keywords: Denial of service, security, routing, ad-hoc networks, sensor networks, wireless networks


Edition: Volume 4 Issue 9, September 2015,


Pages: 264 - 268


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Trupti Pawar, Jyoti Patil, "Vampire Attacks: Draining Life from Wireless Ad-hoc Sensor Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 264-268, https://www.ijsr.net/get_abstract.php?paper_id=SUB158005

Similar Articles with Keyword 'security'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article
Top