ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Vampire Attacks: Detection And Prevention

Journal: International Journal of Computer Techniques (Vol.3, No. 3)

Publication Date:

Authors : ;

Page : 14-21

Keywords : Networking; WSNs; Stretch attack; Carousal attack; EWDA; Routing algorithm; NS2;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless Sensor Networks (WSNs) are used nowadays, and therefore have broad range of interesting applications. WSN can be of hypersensitive nature and therefore might require enhanced secured environment. In today's world WSNs are the basic means of communication. The resources like battery power, processing capabilities, communication and transmitting range are limitations of the system. One of the major challenges in Wireless Networks is the security concerns. Attacks affecting these types of systems are increasing. One of the major resource consumption attacks called vampire attacks. It includes Stretch attack and Carousal attack which affects node and even bring down the entire system by draining the Battery power. In Stretch Attack, attackers construct wrong long routes which leads to traversing almost every node in the network. Stretch attack, increases packet route length, and packets get processed by a number of nodes. Carousel attackers introduce some packet within a route tranquil as a sequence of loops, and so the same node appears in the route many times. The proposed system overcomes this challenge by using the techniques which include the Energy weight detection algorithm and Route Tracking algorithm, so energy consumption is reduced to a great extent. EWDA and Route Tracking algorithm is used to detect and prevent the above problems.

Last modified: 2018-05-18 19:58:40