A Novel Proposal for Defending Against Vampire Attack in WSN

被引:13
|
作者
Patel, Amee A. [1 ]
Soni, Sunil J. [1 ,2 ]
机构
[1] Sankalchand Patel Coll Engn, Visnagar, Gujarat, India
[2] RK Univ, Rajkot, Gujarat, India
关键词
Wireless Sensor Network; Vampire Attack; Energy Consumption; Carousel Attack; Stretch Attack;
D O I
10.1109/CSNT.2015.94
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor network is a communication network across the sensors nodes. A sensor node collects information about the physical environment. Now-a-days one main issue in wireless sensor network is wastage of energy at each sensor nodes. Energy is the one most important factor while considering sensor nodes. One new type of attack called vampire attack, which occurring at network layer. It leads to resource depletion (energy) at each sensor nodes, by reducing the battery power of any node. We propose method to mitigate this type of attack. This paper focuses on the goal of detection of vampire attack. The proposed method prevents the draining of life from network nodes. It works on the threshold energy of node. Thus, the problem of vampire attack can be reduced to some extent.
引用
收藏
页码:624 / 627
页数:4
相关论文
共 50 条
  • [1] Defending Against Wormhole Attack in MANET
    Patel, Anal
    Patel, Nimisha
    Patel, Rajan
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 674 - 678
  • [2] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing (Network Research Center
    Journal of Electronics(China), 2006, (01) : 148 - 153
  • [3] Defending Against Wormhole Attack in OLSR
    HONG Liang HONG Fan FU Cai
    Geo-Spatial Information Science, 2006, (03) : 229 - 233
  • [4] Defending Against Wormhole Attack in OLSR
    Hong Liang
    Hong Fan
    Fu Cai
    GEO-SPATIAL INFORMATION SCIENCE, 2006, 9 (03) : 229 - 233
  • [5] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing Network Research Center Tsinghua University Beijing China Tianjin Key Lab for Advanced Signal Processing Civil Aviation University of China Tianjin China
    JournalofElectronics, 2006, (01) : 148 - 153
  • [6] Defending against the Pirate Evolution Attack
    Jin, Hongxia
    Lotspiech, Jeffrey
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 147 - 158
  • [7] Defending electronic systems against hardware attack
    Jimenez Naharro, Raul
    Gomez Bravo, Fernando
    Gomez Galan, Juan Antonio
    Sanchez Raya, Manuel
    Mata de Acuna, Juan Jose
    PROCEEDINGS OF 2016 TECHNOLOGIES APPLIED TO ELECTRONICS TEACHING (TAEE 2016), 2016,
  • [8] Defending Against the Attack of the Micro-clones
    van Tonder, Rijnard
    Le Goues, Claire
    2016 IEEE 24TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2016,
  • [9] A Novel Authentication Scheme against node captured attack in WSN for healthcare scene
    Yang, Sheng-Kai
    Shiue, Ya-Ming
    Su, Zhi-Yuan
    Liu, Chuan-Gang
    PROCEEDINGS OF 2019 IEEE EURASIA CONFERENCE ON BIOMEDICAL ENGINEERING, HEALTHCARE AND SUSTAINABILITY (IEEE ECBIOS 2019), 2019, : 39 - 42
  • [10] Defending against biological attack: Importance of biotechnology in preparedness
    Pearson, GS
    Roberts, B
    DEFENCE SCIENCE JOURNAL, 2001, 51 (04) : 377 - 392