ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Vampire Attack Detection and Prevention to Defending WSN Based Application

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 6)

Publication Date:

Authors : ; ;

Page : 1717-1722

Keywords : AODV; NS-2; Routing Protocol; RREQ; RREP; Security; Vampire Attack; Wireless Sensor Network;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The wireless technologies are growing due to less dependencies on fixed infrastructure. Wireless sensor network is applicable in various small scale application developments to large scale application development. WSN provide the missing connections among Internet and physical world. The Vampire is a model of malicious activity that is not specific to any specific protocol. That relies on properties of many popular classes of routing protocols. Vampire attack is transmission of a message that causes energy consumption of the network rather than honest node transmitted a message to same destination. The introduced methodology for detection and prevention of Vampire attack is developed using time calculation of sender and receiver when the packet is transferred. The implementation and execution of the proposed concept is implemented through AODV routing protocol modification. Additionally the network simulator 2 i. e. NS-2 is used for simulation of security scheme. The experimental results show the adoptable performance of the algorithm and improve throughput, packet delivery ratio, and energy consumption. Additionally reduces the end to end delay between communicating nodes

Last modified: 2021-06-30 19:12:46