International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 154 - Issue 9 |
Published: Nov 2016 |
Authors: Damayanti D. Pawar, Megha Singh |
![]() |
Damayanti D. Pawar, Megha Singh . Prevention of Vampire Attacks in Wireless Sensor Network. International Journal of Computer Applications. 154, 9 (Nov 2016), 19-20. DOI=10.5120/ijca2016912214
@article{ 10.5120/ijca2016912214, author = { Damayanti D. Pawar,Megha Singh }, title = { Prevention of Vampire Attacks in Wireless Sensor Network }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 154 }, number = { 9 }, pages = { 19-20 }, doi = { 10.5120/ijca2016912214 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Damayanti D. Pawar %A Megha Singh %T Prevention of Vampire Attacks in Wireless Sensor Network%T %J International Journal of Computer Applications %V 154 %N 9 %P 19-20 %R 10.5120/ijca2016912214 %I Foundation of Computer Science (FCS), NY, USA
In today’s world of research computing wireless sensor networks are the widely used for various operations. These networks contain number of sensor nodes whose task is to collect data and send it to the data aggregator for further processing. For these type of networks low powered and energy efficient devices are mostly required for the collection of data because of which energy management becomes an important part of them. One of the major problems related to security which is faced by these networks is that of vampire attacks. These attacks are launched by the adversaries in order to drain the energy from the network so as to create denial of services and abruption. This paper focuses on the effects of vampire attacks on wires less sensor networks especially on Dynamic State Routing Protocol (DSP) & Destination-Sequenced Distance-Vector Routing (DSDV) protocols. The methods are also given to prevent the network from these attacks. The results are collected by performing the attacks on actual networking scenario & applying our system to prevent the attacks.