International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 144 - Issue 9 |
Published: Jun 2016 |
Authors: Priya S. Gosavi, B. M. Patil |
![]() |
Priya S. Gosavi, B. M. Patil . Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks. International Journal of Computer Applications. 144, 9 (Jun 2016), 1-4. DOI=10.5120/ijca2016910424
@article{ 10.5120/ijca2016910424, author = { Priya S. Gosavi,B. M. Patil }, title = { Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 144 }, number = { 9 }, pages = { 1-4 }, doi = { 10.5120/ijca2016910424 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Priya S. Gosavi %A B. M. Patil %T Vampire Attack: Draining Life from Wireless Ad –hoc Sensor Networks%T %J International Journal of Computer Applications %V 144 %N 9 %P 1-4 %R 10.5120/ijca2016910424 %I Foundation of Computer Science (FCS), NY, USA
Ad-hoc wireless networks are dynamic in nature. Ad-hoc networks are not depends on any predefined infrastructure. Whenever there is need of communication at that point these network can be deployed. In this paper we discuss Vampire attacks. All protocols susceptible for vampire attack. Vampire attacks are very easy to carry out throughout the network and difficult to detect. In this paper we discuss a method to mitigate vampire attacks. Then we compare new method with existing protocol and Beacon Vector routing. And we come to the conclusion that new protocol is better as it detect and prevent from vampire attack.