A Novel Proposal for Defending Against Vampire Attack in WSN

被引:13
|
作者
Patel, Amee A. [1 ]
Soni, Sunil J. [1 ,2 ]
机构
[1] Sankalchand Patel Coll Engn, Visnagar, Gujarat, India
[2] RK Univ, Rajkot, Gujarat, India
来源
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015) | 2015年
关键词
Wireless Sensor Network; Vampire Attack; Energy Consumption; Carousel Attack; Stretch Attack;
D O I
10.1109/CSNT.2015.94
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor network is a communication network across the sensors nodes. A sensor node collects information about the physical environment. Now-a-days one main issue in wireless sensor network is wastage of energy at each sensor nodes. Energy is the one most important factor while considering sensor nodes. One new type of attack called vampire attack, which occurring at network layer. It leads to resource depletion (energy) at each sensor nodes, by reducing the battery power of any node. We propose method to mitigate this type of attack. This paper focuses on the goal of detection of vampire attack. The proposed method prevents the draining of life from network nodes. It works on the threshold energy of node. Thus, the problem of vampire attack can be reduced to some extent.
引用
收藏
页码:624 / 627
页数:4
相关论文
共 50 条
  • [21] A SOLUTION FOR DEFENDING AGAINST DENIAL OF SERVICE ATTACK ON WIRELESS LAN
    Nguyen, Dinh-Thuc
    Tran, Ngoc-Bao
    Nguyen-Ho, Minh-Duc
    MOBILE AND WIRELESS NETWORKS SECURITY, PROCEEDINGS, 2008, : 67 - +
  • [22] Legal Framework for Defending Transport Networks Against Terrorist Attack
    Cryer, Robert
    TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 108 - 115
  • [23] Robust Adversarial Watermark Defending Against GAN Synthesization Attack
    Xu, Shengwang
    Qiao, Tong
    Xu, Ming
    Wang, Wei
    Zheng, Ning
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 351 - 355
  • [24] Defending Against Membership Inference Attack by Shielding Membership Signals
    Miao, Yinbin
    Yu, Yueming
    Li, Xinghua
    Guo, Yu
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4087 - 4101
  • [26] Defending against nuclear weapons: A 1950s proposal
    Schweber, Silvan S.
    PHYSICS TODAY, 2007, 60 (04) : 36 - 41
  • [27] Dynamic Forwarding Window Technique against DoS Attack in WSN
    Rolla, Poonam
    Kaur, Manpreet
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 212 - 216
  • [28] Syncim: a new impersonation attack against chip synchronization in WSN
    Tayebi, Arash
    Berber, Setevan
    Swain, Akshya
    2015 9TH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2015, : 128 - 132
  • [29] A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages
    Chen, Yu
    Ku, Wei-Shinn
    Sakai, Kazuya
    DeCruze, Christopher
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 1 - +
  • [30] MaliFuzz: Adversarial Malware Detection Model for Defending Against Fuzzing Attack
    Xianwei Gao
    Chun Shan
    Changzhen Hu
    Journal of Beijing Institute of Technology, 2024, 33 (05) : 436 - 449