首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:A Secure Ad hoc Wireless Sensor Network For Vampire Attack
  • 本地全文:下载
  • 作者:Deepmala Verma ; Gajendra Singh ; Kailash Patidar
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2015
  • 卷号:6
  • 期号:4
  • 页码:4118-4122
  • 出版社:TechScience Publications
  • 摘要:Wireless sensor network is new generation application and information sensing network technology. Ad hoc nature of network adds advantages on the network due to rapid installation, low cost, freedom of mobility. Due to this nature of network the network faces security issues because malicious user can join the network. Thus security is a key area of concern in network technology, most of the time malicious user utilizes the network routing protocol information and creating issues during normal function of network. In this presented work the security is of wireless sensor network is investigated under the vampire attack. The vampire attack is a kind of attack model that can be deployable with any kind of protocols. Therefore it is a serious condition for network, in most of cases the attacker making effort for consuming the energy of network nodes. This causes hurdle in normal functioning of network. Additionally that is also increases routing overhead of the network by which the performance of network get affected. In order to prevent the malicious attacker in network a strong routing technology is required to develop which prevent attacker during the route discovery in network. Therefore a two stage malicious node prevention technique is developed in this work. In first phase the network nodes are classified as the suspected node and legitimate node and further the suspected node is again classified as the malicious node and legitimate node. For implementing the desired technique the AODV routing protocol and NS2 (network simulator 2) is suggested. After implementation of the proposed technique the security and performance is measured and compared with the traditional routing protocol. The comparison of both the network routing protocols are performed on the basis of packet delivery ratio, energy consumption and the RREQ flooding. According to the obtained results the performance of the proposed vampire attack prevention technique is found optimum and efficient as compared to the traditional routing protocol.
  • 关键词:wireless ad hoc networks; routing algorithm;vampire attack; resource consumption; results analysis
国家哲学社会科学文献中心版权所有