2018
DOI: 10.1007/978-3-319-75626-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…The energy for the WSN's sensor nodes is supplied by batteries. However, energy loss is one of the main problems in WSN [1] that is resultant from overhearing, collisions, listening, idle, control packet overhead. The energy loss in the collision loss is introduced by the data packets' collision in the wireless medium.…”
mentioning
confidence: 99%
“…The energy for the WSN's sensor nodes is supplied by batteries. However, energy loss is one of the main problems in WSN [1] that is resultant from overhearing, collisions, listening, idle, control packet overhead. The energy loss in the collision loss is introduced by the data packets' collision in the wireless medium.…”
mentioning
confidence: 99%
“…Moreover, an investigative model is proposed [12] to approximate all node duration from the net lifetime setting. They analyzed power inclusive development and developed methods to enhance the time duration availability of net.…”
Section: Parallel Workmentioning
confidence: 99%
“…2 In this context, sensitivity or high sensing quality is essential for collecting accurate data from the physical environment under deployment. 3 However, WSNs are highly vulnerable to malicious attackers such as selective forwarding, directional, black hole attack, and vampire attack that causes denial of services, since the sensor nodes are battery-operated. 4 In particular, the vampire attackers completely drain the energy of the sensor nodes intentionally, such that they are completely prevented from provisioning its service of forwarding data during the routing process.…”
Section: Introductionmentioning
confidence: 99%