Vampire Attacks: “Intrusion Detection and Efficient Use of Sensor Nodes”

Vaibhav kulkarni, Monika Kalane, Chaitali Jadhav, Harshada Chaudhari, Prof. D.N. Gadekar

Abstract: In the recent years ad-hoc sensor networks are used widely in various aspects and has a wide area of application, the scope of wireless ad-hoc sensor network lies widely in its security and the way the data is transferred, in this paper we will implementing various parameters in order to make secure the wireless sensor networks from vampire attacks, which are not protocol specific ,also catapulted various protocols in order to increase the efficiency of sensor nodes battery and the comparison of graphs depict how efficient our implementation is as compared to previous research, also the protocols used are used to make the wireless sensor network robust and the optimized use of sensor nodes battery. We will also be analyzing the causes and effect causing vampire attack and depletion of sensor nodes battery and preventive measures accomplishing our objective, the graph analysis clearly portray our prominent work as compared to previous articles as less energy consumption thus maximizing the performance of sensors.

Keywords: Protocol, Disparaging, Adversaries, Data Sequestration/Concealment, Data, Substantiation/Corroboration, Data Perpendicularity, Depletion attack

Title: Vampire Attacks: “Intrusion Detection and Efficient Use of Sensor Nodes”

Author: Vaibhav kulkarni, Monika Kalane, Chaitali Jadhav, Harshada Chaudhari, Prof. D.N. Gadekar

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 3, Issue 2, April 2015 - June 2015

Citation
Share : Facebook Twitter Linked In

Citation
Vampire Attacks: “Intrusion Detection and Efficient Use of Sensor Nodes” by Vaibhav kulkarni, Monika Kalane, Chaitali Jadhav, Harshada Chaudhari, Prof. D.N. Gadekar