Book Details


International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


The wireless adhoc sensor network and routing data is vulnerable to certain attacks. So ensure a secure and authenticated data transmission process. There are a lot of protocols developed to protect from DOS attack, but it is not completely possible. One such DOS attack is Vampire attack draining of node life from wireless adhoc sensor networks. It explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ batterypower. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. The methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by vampires during the packet forwarding phase. An proposed project concentrates on securing the network from the malicious attack. The implementation results in the efficient detection and elimination of vampire attack from the network. In order to detect and eliminating the vampire attack are going to implement certain intrusion detection system based on the energy level constraints. The simulation result shows the improved network authentication rate and efficient detection of malicious node from the network, so that proposed system forms a secure network with high through put rate


[1] Acs .G, Buttyan. L, and Vajda .I, (2006). ‘Provably Secure On-Demand Source Routing in Mobile AdHoc Networks’.
[2] Aad.I, Hubaux J.P, and Knightly E.W, (2004) ‘Denial of Service Resilience in Ad Hoc Networks,’Proc. ACM MobiCom..Bos J.W, Osvik D.A, and Stefan.D (2009). ‘Fast Implementations of
[3] AES Various Platforms’ Cryptology e Print Archive,Report 2009/ 501,
[4] Deng.J, Han.R, and Mishra.S, (2005) ‘Defending against Path-Based DoS Attacks in Wireless Sensor Networks,’ Proc. ACM Workshop Security of Ad Hoc and Sensor Networks
[5] Deng.J, Han.R, and. Mishra.S, (2006). ‘INSENS: Intrusion -Tolerant Routing for Wireless Sensor Networks,’Computer Comm.
[6] Doshi.S, Bhandare.S, and. Brown T.X, (2006) ‘An On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network,’ACM SIGMOBILE Mobile Computing and Comm. Rev.Fonseca.R, Ratnasamy.S,Zhao.J, C.T. Ee, Culler.D, (2005).‘BeaconVectorScalable Point-to-Point Routing in Wireless Sensornets’


Denial of service, security, routing, adhoc networks, sensor networks, wireless networks

  • Format Volume 2, Issue 2, No 1, 2014.
  • Copyright All Rights Reserved ©2014
  • Year of Publication 2014
  • Author RAMYA.D
  • Reference JCS - 055
  • Page No 320 - 323 .

Copyright 2021 SK Research Group of Companies. All Rights Reserved.