|
|
Proceeding of
National Conference
on
Recent Trends in Mobile
and Cloud Computing
(NCRMC-2014)
17-18 December, 2014
as
A Special Issue of
International Journal of Computer Science and
Applications
(ISSN:0974-1011)
Chief Patron
Shri Banwarilal Purohit
Chairman,RCOEM
Shri Govindlal Agarwal
General Secretary, RCOEM
Patron
Prof.
Q.H.Jeevaji
Director, DMT, RCOEM
Dr. R.S. Pande
Principal,RCOEM
Conveners
Dr. M. B.
Chandak
(Head, Dept. of CSE)
Co-convener
Dr. A. J.
Agrawal
Organizing Committee
Prof. M. R. Wanjari
Prof. S. G. Mundhada
Prof. A.V. Buche
Prof. N. N. Tirpude
Prof. K. P. Khurana
Prof. D. A. Borikar
Prof. A. R. Raipurkar
Organized by
Dept of Computer Science &
Engineering,
Shri Ramdeobaba College of
Engineering and Management, Nagpur – 440013.
Website:
www.rknec.edu
In association with
Department of Science & Technology
Editor
K. H. Walse
M.S.India
|
|
| |
|
IJCSA ISSN: 0974-1011 (Online)
>> | |
| |
Title: |
A Survey On:
Detection & Prevention of Energy Draining Attacks (Vampire
Attacks) |
Author: |
Mrunal R. Arjunkar,
A.
S. Sambare
and
S.
R. Jain |
|
|
Abstract |
Survivability of network is its ability of being connected
even under failures and attacks. Deployment procedure of a
sensor network in the hostile environment leads it to battery
drainage attacks, as it's impossible to recharge and even
replace sensor node's battery power. The motivation provided
for the research efforts has been given by an idea
maximization of network lifetime, where the lifetime of
network is measure of the instant of deployment to the point.
When any of the nodes has exhausted its limited power source
and becomes in-operational commonly referred as first node
failure. Even a novel approach for routing protocols, affect
from attacks those are designed to be protected, are unable to
provide protection from these attacks, which call Vampire
attacks. This is a class of resource consuming attacks which
permanently disable the whole network by quickly draining
battery of nodes. These attacks are not specific to any
specific routing protocol, are disturbing, difficult to
detect, and are very easy to carry out using as few as one
malicious insider sending only protocol compliant messages.
In this paper, we present the overview of work done by various
researchers in their literature towards various attacks on
wireless sensor networks and mainly focused on energy draining
attacks (Vampire Attacks). |
©2015 International Journal of
Computer Science and Applications
Published by Research
Publications, India |
|
|