Abstract: In the recent years ad-hoc sensor networks are used widely in various aspects and has a wide area of application, the scope of wireless ad-hoc sensor network lies widely in its security and the way the data is transferred, in this paper we will implementing various parameters in order to make secure the wireless sensor networks from vampire attacks, which are not protocol specific ,also catapulted various protocols in order to increase the efficiency of sensor nodes battery and the comparison of graphs depict how efficient our implementation is as compared to previous research, also the protocols used are used to make the wireless sensor network robust and the optimized use of sensor nodes battery. We will also be analyzing the causes and effect causing vampire attack and depletion of sensor nodes battery and preventive measures accomplishing our objective, the graph analysis clearly portray our prominent work as compared to previous articles as less energy consumption thus maximizing the performance of sensors.
Keywords: Protocol, Disparaging, Adversaries, Data Sequestration/Concealment, Data, Substantiation/Corroboration, Data Perpendicularity, Depletion attack
Title: Vampire Attacks: “Intrusion Detection and Efficient Use of Sensor Nodes”
Author: Vaibhav kulkarni, Monika Kalane, Chaitali Jadhav, Harshada Chaudhari, Prof. D.N. Gadekar
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals