2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) 2017
DOI: 10.1109/icomicon.2017.8279174
|View full text |Cite
|
Sign up to set email alerts
|

Detection & prevention of vampire attack in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In this context, "r" number of decision matrices are constructed based on the linguistic variable rating values provisioned by "r" decision makers as presented in Equation (1).…”
Section: Proposed Bi-polar Fuzzy Information-based Promethee-based Ou...mentioning
confidence: 99%
See 1 more Smart Citation
“…In this context, "r" number of decision matrices are constructed based on the linguistic variable rating values provisioned by "r" decision makers as presented in Equation (1).…”
Section: Proposed Bi-polar Fuzzy Information-based Promethee-based Ou...mentioning
confidence: 99%
“…The rapid and progressive developments in digital electronics and wireless communications with respect to computational power have facilitated a diversified number of applications through wireless ad hoc sensor networks. 1 Some of the most significant wireless ad hoc sensor networks applications include military, industry, agriculture and so forth.…”
Section: Introductionmentioning
confidence: 99%
“…This vampire node mitigation approach utilized the phases of topology discovery and packet forwarding to learn the unique address of each sensor node and the proximity of the packets dynamically moving in the network. Sharma and Joshi 16 propounded a vampire detection approach using fuzzy theory to resolve the data uncertainty involved during data exchange. This fuzzy approach explored the dimensions of energy, directly and indirectly, packet forwarding potential.…”
Section: Related Workmentioning
confidence: 99%
“…• specific types of ERE attacks, such as vampire attacks [1][2][3], denial-of-sleep attacks [4][5][6][7][8], attacks on specific crypto-protocols, causing increased power consumption on their executing devices [9], various jamming attacks [10,11], replay attacks and collision attacks [12], etc. ; • specific applications and systems analyzed for possible ERE attacks, such as attacks on personal portable mobile devices in direct line of sight [13,14], combined attacks on mobile devices, using vulnerabilities of a cellular network server [15], attacks on separately located sensors [16], attacks on mesh networks built on specific network protocols [17], attacks on drones [18], attacks on implantable medical devices, taking into account various ways to replenish their charge [19], etc.…”
Section: Introductionmentioning
confidence: 99%
“…; • specific applications and systems analyzed for possible ERE attacks, such as attacks on personal portable mobile devices in direct line of sight [13,14], combined attacks on mobile devices, using vulnerabilities of a cellular network server [15], attacks on separately located sensors [16], attacks on mesh networks built on specific network protocols [17], attacks on drones [18], attacks on implantable medical devices, taking into account various ways to replenish their charge [19], etc. ; • specific recommendations and particular solutions that can be used to protect against a certain type of such attacks, such as isolation of segments and layers of sensor networks to protect the nodes (victims of ERE attacks) [2,20], packet filtering on some intermediate nodes and comparison with passing traffic patterns [17,19], in particular by using machine learning [21].…”
Section: Introductionmentioning
confidence: 99%