Proceeding of

National Conference


Recent Trends in Mobile

and Cloud Computing


17-18 December, 2014



A Special Issue of

International Journal of Computer Science and Applications


Chief Patron

Shri Banwarilal Purohit 



Shri Govindlal Agarwal

General Secretary, RCOEM




 Prof. Q.H.Jeevaji

Director, DMT, RCOEM


Dr. R.S. Pande




Dr. M. B. Chandak

(Head, Dept. of CSE)



Dr. A. J. Agrawal


Organizing Committee

Prof. M. R. Wanjari

Prof. S. G. Mundhada

Prof. A.V. Buche

Prof. N. N. Tirpude

Prof. K. P. Khurana

Prof. D. A. Borikar

Prof. A. R. Raipurkar

Organized by

Dept of Computer Science & Engineering,

Shri Ramdeobaba College of Engineering and Management, Nagpur 440013.



In association with

Department of Science & Technology




K. H. Walse





IJCSA ISSN: 0974-1011 (Online) >>    
A Survey On: Detection & Prevention of Energy Draining Attacks (Vampire Attacks)
Mrunal R. Arjunkar, A. S. Sambare and S. R. Jain


Survivability of network is its ability of being connected even under failures and attacks. Deployment procedure of a sensor network in the hostile environment leads it to battery drainage attacks, as it's impossible to recharge and even replace sensor node's battery power. The motivation provided for the research efforts has been given by an idea maximization of network lifetime, where the lifetime of network is measure of the instant of deployment to the point. When any of the nodes has exhausted its limited power source and becomes in-operational commonly referred as first node failure. Even a novel approach for routing protocols, affect from attacks those are designed to be protected, are unable to provide protection from these attacks, which call Vampire attacks. This is a class of resource consuming attacks which permanently disable the whole network by quickly draining battery of nodes. These attacks are not specific to any specific routing protocol, are disturbing, difficult to detect, and are very easy to carry out using as few as one malicious insider sending only protocol compliant messages. In this paper, we present the overview of work done by various researchers in their literature towards various attacks on wireless sensor networks and mainly focused on energy draining attacks (Vampire Attacks).

2015 International Journal of Computer Science and Applications 

Published by Research Publications, India