Impact of Vampire Attack on Performance of Wireless Sensor Networks: A Survey

Taruna Malviya, Khushboo Sawant


A wireless sensor networks is a temporary, infrastructure less network where nodes communicate without any centralized mechanism. This dynamic behaviour of WSN makes this network more potentially applicable in conference, battlefield environment and disaster relief, and has received significant attention in recent years.  Attacker may use this weakness to disrupt the network. Subsequently, Power draining is the major thread; where attacker not only exhausts the network traffic but also degrades the life of node as well network. The objective of this study is to detect and prevent wireless sensor networks from unwanted power draining due to Vampire attack. Here, Targeted Flooding through high battery capacity node has been used to deploy Vampire attack in mobile ad-hoc network. Subsequently, energy consumption and capacity observation technique has been used to detect malicious node(s). Furthermore, prevention method forcefully shutdown malicious nodes and transfer communication.

Full Text:



Zubair A. Baig et. “Distributed Denial of Service Attack Detection in Wireless Sensor Networks” Doctor of Philosophy Monash University January, 2008.

“The Network Simulator - ns-2,”,2012.

Ambili M. A, “Vampire Attack : Detection and Elimination in WSN”, in International Journal Of Scientific Research Volume:3 April 2014 ISSN No 2277-8179

Chahana B. Thakur; V.B. Vaghela “Detection and Elimination of Vampire Attack in Mobile Ad hoc Network” Indian Journal of Applied Research Volume: 5 Jan 2015 ISSN No 2249-555X.

T.W. Mehran Abolhasan, "A review of routing protocols for mobile ad hoc network," ELSEVIER, Ad-hoc Network, vol. 2, pp. 1-22, 2004.

M. B. Hardeep Kaur, "Performance of AODV, OLSR AND ZRP Routing Protocol under the blackhole Attack in WSN," IJAREEIE, vol. 2, pp. 2320-3765, June 2013.

V. V. P. Rajipriyadharshini, "Vampire Attacks Deploying Resources in Wireless Sensor Network," International Journal of Computer Science and Information Technology, vol. 5, no. 3, pp. 2951-2953, 2014.

D. J. A. P. Preethi Monoline, "Cache Consistency and IDS for Handling Attacks in Routing Ad-hocNetwork," International journal of Innovative Research in Computer and ommunication Engineering, vol. 2, no. 4, 2007.

S. R. Susan Sharon George, "Attack-Resistant Routing for Wireless A- hoc Network," International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 420- 442, 2014.

I.-R. C. Fenye Bao, "Hierarchical Trust Management for Wireless Sensor Networks and its Application to Trust-Based Routing and Intrusion Detection,"IEEE Transaction on network and service managemnet, vol. 9, no. 2, July 2012.

J. D. B. Umakanth, "Detection of Energy draining attack using EWMA in Wireless Ad-hoc Sensor Network," International Journal of Engineering trends and Technology, vol. 4, no. 8, August 2013.

Y.Yuanming Wu,"Insider Threats against Trust Mechanism with Watchdog and Defending Aproaches in Wireless Sensor Networks," IEEE Symposium on Security and Privacy workshop, 2012.

K. S. Jose Anand, "Vampire Attack Detection in Wireless Sensor Network," International Journal of Engineering Science and Innovative Technology, vol. 3, no. 4, July 2014.

Buchegger, S. and J.-Y.L. Boudec. Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts against Malice and Selfishness. 2002. Springer.

Baker, F., Network Working Group, 2002, Cisco Systems. p. 40.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.