2015 IEEE International Advance Computing Conference (IACC) 2015
DOI: 10.1109/iadcc.2015.7154669
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring an early recognition and avoidance of the vampire attacks in WSN using routing loops

Abstract: In sensing it's the ad-hoc sensor and data routing which is an important research direction. Security work is prioritized in this area and focusing primarily at medium access control or the routing levels on denial of communication. Attacks focusing on routing protocol layer are known as resource depletion attacks in this paper. This attack impacts by persistently disabling the network and causing the node's battery power drain drastically. There are protocols established which tends to protect from DOS attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In this paper [37], firstly targets to evaluate these vulnerabilities to routing layer battery reduction attacks. Secondly, it focuses upon the change in an existing routing protocol to bound loss due to Vampire attacks at the time of the forwarding of packets.…”
Section: Network Security In Wireless Sensor Networkmentioning
confidence: 99%
“…In this paper [37], firstly targets to evaluate these vulnerabilities to routing layer battery reduction attacks. Secondly, it focuses upon the change in an existing routing protocol to bound loss due to Vampire attacks at the time of the forwarding of packets.…”
Section: Network Security In Wireless Sensor Networkmentioning
confidence: 99%
“…3 However, WSNs are highly vulnerable to malicious attackers such as selective forwarding, directional, black hole attack, and vampire attack that causes denial of services, since the sensor nodes are battery-operated. 4 In particular, the vampire attackers completely drain the energy of the sensor nodes intentionally, such that they are completely prevented from provisioning its service of forwarding data during the routing process. 5 This vampire attack not only drains the energy of the restricted energy source but also rumbles the overall network performance.…”
Section: Introductionmentioning
confidence: 99%
“…The trustworthiness and connectivity of the network depend on the energy drain rate and the colluders. 2 The presence of vampire nodes makes the ad hoc networks more vulnerable by rapidly draining a considerable amount of energy. 3 Vampire attacks are considered the most vulnerable kind of resource-draining attack as it disables the network's connectivity by draining mobile node's energy at a faster rate.…”
Section: Introductionmentioning
confidence: 99%