Advertisement

A Literature Survey on Detection and Prevention Against Vampire Attack in WSN

  • Richa KumariEmail author
  • Pankaj Kumar Sharma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 553)

Abstract

Wireless sensor network (WSN) is an ad hoc low power wireless network in which sensor nodes cooperatively monitor and gather the information from environment then broadcast that information to other nodes. So security against denial of services (DoS) at routing levels is the most significant area of research. In this paper, denial of service at the routing level are discussed. DoS is cause by resource exhaustion at the network layer, which completely disable the network by consuming node’s battery power. This power draining attack is known as “vampire attack” which is not definitive to any routing protocol. A single Vampire can raise network energy usage by a factor of O(N) in worst case, here N is the number of nodes. This paper reviews some methods to detect and mitigate this attack that raise the energy consumption of network and concepts that bounds the damage from Vampires.

Keywords

Wireless sensor network Security issue Routing protocol Vampire attack 

References

  1. 1.
    Gowrishankar. S, T. G. Basavaraju, Manjaiah D. H, Subir Kumar Sarkar.: Issues in Wireless Sensor Networks: July 2–4, 2008, London, U.K.Google Scholar
  2. 2.
    I. Aad, J.-P. Hubaux, and E. W. Knightly.: Denial of Service Resilience in Ad Hoc Networks: Proc. ACM MobiCom, 2004.Google Scholar
  3. 3.
    A. D. Wood and J. A. Stankovic.: Denial of Service in Sensor Networks: Computer, vol. 35, no. 10, pp. 54–62, Oct. 2002.Google Scholar
  4. 4.
    P. Rajipriyadharshini and V. Venkatakrishnan, S. Suganya and A. Masanam.: Vampire Attacks Deploying Resources in Wireless Sensor Networks: (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, ISSN: 0975-9646.Google Scholar
  5. 5.
    T. H. Clausen and P. Jacquet, Optimized Link State Routing Protocol, IETF RFC 3626, 2003.Google Scholar
  6. 6.
    C. E. Perkins and P. Bhagwat.: Highly Dynamic Destination- Sequenced Distance Vector Routing (DSDV) for Mobile Computers: Proc. Conf. Comm. Architectures, Protocols and Applications, 1994.Google Scholar
  7. 7.
    Y.-C. Hu, D. B. Johnson, and A. Perrig.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks: Proc. IEEE INFOCOM, 2003.Google Scholar
  8. 8.
    Eugene Y. Vasserman and Nicholas Hopper.: Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Network: Ieee Transactions On Mobile Computing, Vol. 12, No. 2, February 2013.Google Scholar
  9. 9.
    K. Vanitha, and V. Dhivya.: A Valuable Secure Protocol to Prevent Vampire Attacks in Wireless Ad Hoc Sensor Networks: IEEE International Conference on Innovations in Engineering and Technology (ICIET’14) Volume 3, Special Issue 3, March 2014 B.Google Scholar
  10. 10.
    Umakant, and J. Damodhar.: Resource Consumption Attacks in Wireless Ad Hoc Sensor Networks: International Journal of Engineering Research ISSN: 2319-6890 (online), 2347-5013 (print) Volume No. 3 Issue No: Special 2, pp: 107-111 22 March 2014.Google Scholar
  11. 11.
    Ashish Patil and Rahul Gaikwad.: Preventing Vampire Attack in Wireless Sensor Network by using Trust.: International Journal of Engineering Research & Technology ISSN: 2278-0181Vol. 4 Issue 06, June-2015.Google Scholar
  12. 12.
    Shrikant C. Chumble1 and M. M. Ghonge.: Simulation of Mitigation of Vampire Attack in Wireless Ad-hoc Sensor Network: International Journal of Advent Research in Computer and Electronics (IJARCE), Vol. 2, No. 9, September 2015 E-ISSN: 2348-5523.Google Scholar
  13. 13.
    Amee A. Patel and Sunil J. Soni.: A Novel Proposal for Defending Against Vampire Attack in WSN: International Conference on Communication Systems and Network Technologies, DOI  10.1109/CSNT in 2015.
  14. 14.
    AnkitaShrivastava, Rakesh Verma.: Detection of Vampire Attack in Wireless Ad-hoc Network: international journal of Software & Hardware Research in engineering volume 1 issue jan-2015.Google Scholar
  15. 15.
    BestyHaris.: Wolf Routing to Detect Vampire Attacks in Wireless Sensor Networks: International Journal of Computer Science and Information Technologies, Vol. 6 (3), ISSN No. 0975-9646 2806-2809, 2015.Google Scholar
  16. 16.
    Manish Soni and Bharat Pahadiya.: Detection and Removal of Vampire Attack in Wireless Sensor Network: International Journal of Computer Applications (0975–8887) Volume 126 – No. 7, September 2015.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGovernment Women Engineering CollegeAjmerIndia

Personalised recommendations