International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1620
Solution to Vampire Attacks: Techniques to Make Network Live
Vikas Juneja
1
, D.V. Gupta
2
1
Assistant Professor, Department of Information Technology, JMIT, Radaur, Haryana, India
2
Professor, Department of Mathematics, College of Engineering Roorkee (COER), Roorkee, Uttarakhand, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless sensor network (WSN) is a network of
low cost, low energy sensor nodes which collects the
information around physical surroundings. Sensing and
pervasive computing features of WSN opened up various
applications which in turn lead to research work. In various
areas such as in military, forest, health, inventory etc., WSN
has been implemented. In WSN, Energy is an important factor
for sensor node. There is one new type of attack called vampire
attack has been exposed which disables network by
overwhelming battery life of sensor nodes in a network. The
proposed work introduces new methodologies focused on
energy based intrusion detection system, path tracking
techniques, on energy threshold and packet broadcast
threshold of sensor node of network. Earlier it was limited to
packet forwarding phase only but not work with topology
change. The projected solution is simple and also works with
topology change in network.
Key Words: Vampire attack, Wireless sensor network,
Intrusion detection, Routing,Security.
1.INTRODUCTION
A Wireless Sensor Network (WSN) constructed of large
number of sensor nodes may be in hundreds or
thousands. These sensor nodes can transfer
information to each other inside network or directly to
an outer base-station node. The more sensor nodes
make network to sense over more physical areas with
higher degree of accuracy. Sensor nodes communicate
sensed data to each other and form high-quality useful
information about the surroundings [1]. Each sensor
node bases its decisions on its goal, currently gathered
information, and its proficiency of its computation,
transmission, and energy assets. These distributed
sensor nodes have the ability to route data either to
other sensors or to an external network nodes. This
node may be a stationary node or a mobile node
proficient of connecting the sensor network to the
available communication infrastructure or to the web
where a user has access to the sensed information.
Attractive features [2] of Vampire attacks that make
them the most prominent attack are:
• Vampire Attacks are not protocol-specific
i.e. they do not target particular protocol.
• Vampires use Protocol-Compliant
messages.
• Transmission of trivial information with
largest energy drain is achieved.
• They do not interrupt or alter discovered
paths.
In this paper, the solutions or techniques of the
vampire attacks in the wireless ad hoc networks are
discussed. These types of attacks not directly link with
the protocols; it links with the properties of the routing
protocols in the communication networks. This attack
affects the properties such as relation state between
the nodes, remoteness vectors between the nodes,
resource and location based routing. The vampire
attack in the WSN is not easy to discover and to predict.
Due to the solitary vampire attack in the networks,
total force goes down and leads to the complete system
to the collapse. In order to overcome the above attacks
in the wireless ad hoc networks we proposed
techniques for secured transmission in the networks.
In order to overcome the above attacks, various
techniques such that an efficient intrusion detection
system based on energy of nodes, path tracking
approach and on energy threshold and packet
broadcast threshold of sensor node of network are
discussed.
The remainder of this paper is organized in three
sections. The first section will discuss the related work
which familiarizes the earlier security measures on
wireless sensor network. Second section will discuss
the proposed techniques to overcome the vampire
attacks. After that paper is concluded.