A Silver-Coated Scheme for Detection and Prevention Against Vampire Attack in Wireless Sensor Network

  • Richa Kumari
  • Pankaj Kumar Sharma
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 472)


An ad hoc wireless sensor network is used to monitor the environment of a specific geographical area in which they gather the information from physical environment and transfer the information to the other node. Nowadays, the main problem that occurs in WSN is the diffusion of battery power at individual sensor device. Battery-power is one of the most critical aspect while deals with sensor devices because every nodes operated by battery and battery is limited in each node. A different variety of intrusion called vampire attack occurs at routing layer and medium access control layer, which are disastrous, arduous to recognize and very simple to implement by applying one nasty node sends random protocol-independent packets so that it drains the energy form sensory device. A single vampire can raise the network power consumption by an aid of O (N) in the poor case, where N is the number of nodes in WSN. We develop a scheme to reduce the impact of this type of attack for AODV routing protocol. The objective of this paper is detection and prevention of directional antenna vampire attack on stateful protocol. The suggested scheme restricts the consumption of energy from those nodes which are not the part of honest path, so trouble of directional antenna vampire attack can be minimized to a certain range.


Ad hoc wireless sensor network Denial-of-service Routing protocol Vampire attack 


  1. 1.
    Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless sensor networks—a survey. Wireless communications, IEEE 11.6Google Scholar
  2. 2.
    Naqishbandi TA, Sheriff I (2014) A resilient strategy against energy attacks in WSN and future IoT. Int J Adv Res Comput Sci Softw Eng 4(2):766–773. ISSN: 2277 128XGoogle Scholar
  3. 3.
    Kumari R, Sharma P (2016) A literature survey on detection and prevention against vampire attack in WSN. In: International conference on computer, communication and computational sciences [IC4S 2016], pp 122–126, Ajmer (Raj.), August 2016Google Scholar
  4. 4.
    Hu Y-C, Johnson DB, Perrig A (2003) Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of the IEEE INFOCOM, pp 8–13Google Scholar
  5. 5.
    Vasserman EY, Hopper N (2013) Vampire attacks: draining life from wireless ad hoc sensor network. IEEE Trans Mobile Comput 12(2):318–332Google Scholar
  6. 6.
    Vanitha K, Dhivya V (2014) A valuable secure protocol to prevent vampire attacks in wireless ad hoc sensor networks. In: IEEE international conference on innovations in engineering and technology (ICIET’14), vol 3, special issue 3, March 2014Google Scholar
  7. 7.
    Umakant, Damodhar J (2014) Resource consumption attacks in wireless ad hoc sensor networks. Int J Eng Res 3(2):107–111. ISSN: 2319-6890(online), 2347-5013(print)Google Scholar
  8. 8.
    Patil A, Gaikwad R (2015) Preventing vampire attack in wireless sensor network by using trust. Int J Eng Res Technol 4(06). ISSN: 2278-0181Google Scholar
  9. 9.
    Chumble SC, Ghonge MM (2015) Simulation of mitigation of vampire attack in wireless ad-hoc sensor network. Int J Advent Res Comput Electr (IJARCE) 2(9). E-ISSN: 2348-5523Google Scholar
  10. 10.
    Patel AA, Soni SJ (2015) A novel proposal for defending against vampire attack in WSN. In: International conference on communication systems and network technologies.

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGovernment Mahila Engineering CollegeAjmerIndia

Personalised recommendations