International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117

India | Computer Science Engineering | Volume 6 Issue 6, June 2017 | Pages: 1717 - 1722


Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

Abstract: The wireless technologies are growing due to less dependencies on fixed infrastructure. Wireless sensor network is applicable in various small scale application developments to large scale application development. WSN provide the missing connections among Internet and physical world. The Vampire is a model of malicious activity that is not specific to any specific protocol. That relies on properties of many popular classes of routing protocols. Vampire attack is transmission of a message that causes energy consumption of the network rather than honest node transmitted a message to same destination. The introduced methodology for detection and prevention of Vampire attack is developed using time calculation of sender and receiver when the packet is transferred. The implementation and execution of the proposed concept is implemented through AODV routing protocol modification. Additionally the network simulator 2 i. e. NS-2 is used for simulation of security scheme. The experimental results show the adoptable performance of the algorithm and improve throughput, packet delivery ratio, and energy consumption. Additionally reduces the end to end delay between communicating nodes

Keywords: AODV, NS-2, Routing Protocol, RREQ, RREP, Security, Vampire Attack, Wireless Sensor Network

How to Cite?: Rajani Jagle, Dr. Abhay Kothari, "Vampire Attack Detection and Prevention to Defending WSN Based Application", Volume 6 Issue 6, June 2017, International Journal of Science and Research (IJSR), Pages: 1717-1722, https://www.ijsr.net/getabstract.php?paperid=ART20174013, DOI: https://dx.doi.org/10.21275/ART20174013


Download Article PDF


Rate This Article!

Received Comments

No approved comments available.


Top