Proceeding of

National Conference

on

Recent Trends in Mobile

and Cloud Computing

(NCRMC-2014)

17-18 December, 2014

 

as

A Special Issue of

International Journal of Computer Science and Applications

(ISSN:0974-1011)

Chief Patron

Shri Banwarilal Purohit 

Chairman,RCOEM

 

Shri Govindlal Agarwal

General Secretary, RCOEM

 

Patron

 

 Prof. Q.H.Jeevaji

Director, DMT, RCOEM

 

Dr. R.S. Pande

Principal,RCOEM

 

Conveners

Dr. M. B. Chandak

(Head, Dept. of CSE)

 

Co-convener

Dr. A. J. Agrawal

 

Organizing Committee

Prof. M. R. Wanjari

Prof. S. G. Mundhada

Prof. A.V. Buche

Prof. N. N. Tirpude

Prof. K. P. Khurana

Prof. D. A. Borikar

Prof. A. R. Raipurkar

Organized by

Dept of Computer Science & Engineering,

Shri Ramdeobaba College of Engineering and Management, Nagpur – 440013.

Website: www.rknec.edu

 

In association with

Department of Science & Technology

 

 

Editor

K. H. Walse

M.S.India

 

 

 

   
   
   
   
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
IJCSA ISSN: 0974-1011 (Online) >>    
Title:
A Survey On: Detection & Prevention of Energy Draining Attacks (Vampire Attacks)
Author:
Mrunal R. Arjunkar, A. S. Sambare and S. R. Jain
 

Abstract

Survivability of network is its ability of being connected even under failures and attacks. Deployment procedure of a sensor network in the hostile environment leads it to battery drainage attacks, as it's impossible to recharge and even replace sensor node's battery power. The motivation provided for the research efforts has been given by an idea maximization of network lifetime, where the lifetime of network is measure of the instant of deployment to the point. When any of the nodes has exhausted its limited power source and becomes in-operational commonly referred as first node failure. Even a novel approach for routing protocols, affect from attacks those are designed to be protected, are unable to provide protection from these attacks, which call Vampire attacks. This is a class of resource consuming attacks which permanently disable the whole network by quickly draining battery of nodes. These attacks are not specific to any specific routing protocol, are disturbing, difficult to detect, and are very easy to carry out using as few as one malicious insider sending only protocol compliant messages. In this paper, we present the overview of work done by various researchers in their literature towards various attacks on wireless sensor networks and mainly focused on energy draining attacks (Vampire Attacks).



©2015 International Journal of Computer Science and Applications 

Published by Research Publications, India