A Novel Proposal for Defending Against Vampire Attack in WSN

被引:13
|
作者
Patel, Amee A. [1 ]
Soni, Sunil J. [1 ,2 ]
机构
[1] Sankalchand Patel Coll Engn, Visnagar, Gujarat, India
[2] RK Univ, Rajkot, Gujarat, India
来源
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015) | 2015年
关键词
Wireless Sensor Network; Vampire Attack; Energy Consumption; Carousel Attack; Stretch Attack;
D O I
10.1109/CSNT.2015.94
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor network is a communication network across the sensors nodes. A sensor node collects information about the physical environment. Now-a-days one main issue in wireless sensor network is wastage of energy at each sensor nodes. Energy is the one most important factor while considering sensor nodes. One new type of attack called vampire attack, which occurring at network layer. It leads to resource depletion (energy) at each sensor nodes, by reducing the battery power of any node. We propose method to mitigate this type of attack. This paper focuses on the goal of detection of vampire attack. The proposed method prevents the draining of life from network nodes. It works on the threshold energy of node. Thus, the problem of vampire attack can be reduced to some extent.
引用
收藏
页码:624 / 627
页数:4
相关论文
共 50 条
  • [41] Spectrum sensing defending against PUE attack based on fractal dimension
    Fu, Shuang
    Zhang, Guoyin
    Li Yang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S2667 - S2675
  • [42] LFighter: Defending against the label-flipping attack in federated learning
    Jebreel, Najeeb Moharram
    Domingo-Ferrer, Josep
    Sanchez, David
    Blanco-Justicia, Alberto
    NEURAL NETWORKS, 2024, 170 : 111 - 126
  • [43] Detection of Cloned Recognizers: A Defending Method against Recognizer Cloning Attack
    Mori, Yuto
    Nakamura, Kazuaki
    Nitta, Naoko
    Babaguchi, Noboru
    2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 1375 - 1380
  • [44] Spectrum sensing defending against PUE attack based on fractal dimension
    Shuang Fu
    Guoyin Zhang
    Li Yang
    Cluster Computing, 2019, 22 : 2667 - 2675
  • [45] A novel Approach to avoid malicious attack to enhance network in WSN
    Guruprasanna, R.
    Sujatha, M.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1686 - 1690
  • [46] WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK
    Tang, Huan-Rong
    Sun, Rou-Ling
    Kong, Wei-Qiang
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1464 - 1470
  • [47] Key Exchange Protocol for WSN Resilient against Man in the Middle Attack
    Saqib, Najmus
    2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 265 - 269
  • [48] A Theil Index-Based Countermeasure Against Advanced Vampire Attack in Internet of Things
    Pu, Cong
    Brown, Jacqueline
    Carpenter, Logan
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,
  • [49] Defending against Packet-In messages flooding attack under SDN context
    Gao, Deyun
    Liu, Zehui
    Liu, Ying
    Foh, Chuan Heng
    Zhi, Ting
    Chao, Han-Chieh
    SOFT COMPUTING, 2018, 22 (20) : 6797 - 6809
  • [50] CardioDefense: Defending against adversarial attack in ECG classification with adversarial distillation training
    Shao, Jiahao
    Geng, Shijia
    Fu, Zhaoji
    Xu, Weilun
    Liu, Tong
    Hong, Shenda
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2024, 91