Prevention of Vampire Attacks in Wireless Sensor Network Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.5120/ijca2016912214
In today's world of research computing wireless sensor networks are the widely used for various operations.These networks contain number of sensor nodes whose task is to collect data and send it to the data aggregator for further processing.For these type of networks low powered and energy efficient devices are mostly required for the collection of data because of which energy management becomes an important part of them.One of the major problems related to security which is faced by these networks is that of vampire attacks.These attacks are launched by the adversaries in order to drain the energy from the network so as to create denial of services and abruption.This paper focuses on the effects of vampire attacks on wires less sensor networks especially on Dynamic State Routing Protocol (DSP) & Destination-Sequenced Distance-Vector Routing (DSDV) protocols.The methods are also given to prevent the network from these attacks.The results are collected by performing the attacks on actual networking scenario & applying our system to prevent the attacks.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.5120/ijca2016912214
- https://doi.org/10.5120/ijca2016912214
- OA Status
- bronze
- Cited By
- 2
- References
- 3
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2553779814
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2553779814Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5120/ijca2016912214Digital Object Identifier
- Title
-
Prevention of Vampire Attacks in Wireless Sensor NetworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-11-17Full publication date if available
- Authors
-
Damayanti Damayanti, Megha SinghList of authors in order
- Landing page
-
https://doi.org/10.5120/ijca2016912214Publisher landing page
- PDF URL
-
https://doi.org/10.5120/ijca2016912214Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5120/ijca2016912214Direct OA link when available
- Concepts
-
Vampire, Computer science, Wireless sensor network, Computer security, Wireless, Telecommunications, Computer network, Artificial intelligenceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2022: 1, 2018: 1Per-year citation counts (last 5 years)
- References (count)
-
3Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2553779814 |
|---|---|
| doi | https://doi.org/10.5120/ijca2016912214 |
| ids.doi | https://doi.org/10.5120/ijca2016912214 |
| ids.mag | 2553779814 |
| ids.openalex | https://openalex.org/W2553779814 |
| fwci | 0.29853518 |
| type | article |
| title | Prevention of Vampire Attacks in Wireless Sensor Network |
| biblio.issue | 9 |
| biblio.volume | 154 |
| biblio.last_page | 20 |
| biblio.first_page | 19 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9986000061035156 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9977999925613403 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T11498 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9901000261306763 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Security in Wireless Sensor Networks |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2776562800 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9394957423210144 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q7912960 |
| concepts[0].display_name | Vampire |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8921418786048889 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C24590314 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5757128596305847 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q336038 |
| concepts[2].display_name | Wireless sensor network |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.49445605278015137 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C555944384 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4540407061576843 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[4].display_name | Wireless |
| concepts[5].id | https://openalex.org/C76155785 |
| concepts[5].level | 1 |
| concepts[5].score | 0.3924984931945801 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[5].display_name | Telecommunications |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.3582500219345093 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C154945302 |
| concepts[7].level | 1 |
| concepts[7].score | 0.19351398944854736 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[7].display_name | Artificial intelligence |
| keywords[0].id | https://openalex.org/keywords/vampire |
| keywords[0].score | 0.9394957423210144 |
| keywords[0].display_name | Vampire |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8921418786048889 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/wireless-sensor-network |
| keywords[2].score | 0.5757128596305847 |
| keywords[2].display_name | Wireless sensor network |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.49445605278015137 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/wireless |
| keywords[4].score | 0.4540407061576843 |
| keywords[4].display_name | Wireless |
| keywords[5].id | https://openalex.org/keywords/telecommunications |
| keywords[5].score | 0.3924984931945801 |
| keywords[5].display_name | Telecommunications |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.3582500219345093 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[7].score | 0.19351398944854736 |
| keywords[7].display_name | Artificial intelligence |
| language | en |
| locations[0].id | doi:10.5120/ijca2016912214 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210206007 |
| locations[0].source.issn | 0975-8887 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 0975-8887 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Computer Applications |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.5120/ijca2016912214 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Computer Applications |
| locations[0].landing_page_url | http://doi.org/10.5120/ijca2016912214 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5103163453 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0724-561X |
| authorships[0].author.display_name | Damayanti Damayanti |
| authorships[0].countries | US |
| authorships[0].affiliations[0].raw_affiliation_string | Post Graduate Student Department of Computer Engineering, |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I1280339224 |
| authorships[0].affiliations[1].raw_affiliation_string | Department of Computer Engineering, C.I.I. |
| authorships[0].institutions[0].id | https://openalex.org/I1280339224 |
| authorships[0].institutions[0].ror | https://ror.org/03nhmbj89 |
| authorships[0].institutions[0].type | government |
| authorships[0].institutions[0].lineage | https://openalex.org/I1280339224 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | United States Nuclear Regulatory Commission |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Damayanti D. |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Engineering, C.I.I., Post Graduate Student Department of Computer Engineering, |
| authorships[1].author.id | https://openalex.org/A5109062550 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Megha Singh |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I1280339224 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Engineering, C.I.I. |
| authorships[1].affiliations[1].raw_affiliation_string | Post Graduate Student Department of Computer Engineering, |
| authorships[1].institutions[0].id | https://openalex.org/I1280339224 |
| authorships[1].institutions[0].ror | https://ror.org/03nhmbj89 |
| authorships[1].institutions[0].type | government |
| authorships[1].institutions[0].lineage | https://openalex.org/I1280339224 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | United States Nuclear Regulatory Commission |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Megha Singh |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Engineering, C.I.I., Post Graduate Student Department of Computer Engineering, |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5120/ijca2016912214 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Prevention of Vampire Attacks in Wireless Sensor Network |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9986000061035156 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2130966263, https://openalex.org/W2510217115, https://openalex.org/W2378314110, https://openalex.org/W1781058469, https://openalex.org/W2078600672, https://openalex.org/W2113861813, https://openalex.org/W2145745943, https://openalex.org/W1965229852, https://openalex.org/W2396046112, https://openalex.org/W4205116303 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2022 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2018 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5120/ijca2016912214 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210206007 |
| best_oa_location.source.issn | 0975-8887 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 0975-8887 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Computer Applications |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.5120/ijca2016912214 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Computer Applications |
| best_oa_location.landing_page_url | http://doi.org/10.5120/ijca2016912214 |
| primary_location.id | doi:10.5120/ijca2016912214 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210206007 |
| primary_location.source.issn | 0975-8887 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 0975-8887 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Computer Applications |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.5120/ijca2016912214 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Computer Applications |
| primary_location.landing_page_url | http://doi.org/10.5120/ijca2016912214 |
| publication_date | 2016-11-17 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W6603860290, https://openalex.org/W2072463110, https://openalex.org/W2004235835 |
| referenced_works_count | 3 |
| abstract_inverted_index.& | 129, 157 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.an | 62 |
| abstract_inverted_index.as | 101 |
| abstract_inverted_index.by | 77, 88, 149 |
| abstract_inverted_index.in | 91 |
| abstract_inverted_index.is | 24, 75, 80 |
| abstract_inverted_index.it | 30 |
| abstract_inverted_index.of | 3, 19, 40, 54, 57, 65, 67, 82, 105, 114 |
| abstract_inverted_index.on | 111, 117, 123, 153 |
| abstract_inverted_index.so | 100 |
| abstract_inverted_index.to | 25, 31, 72, 93, 102, 139, 161 |
| abstract_inverted_index.and | 28, 44, 107 |
| abstract_inverted_index.are | 9, 48, 86, 136, 147 |
| abstract_inverted_index.for | 13, 35, 51 |
| abstract_inverted_index.low | 42 |
| abstract_inverted_index.our | 159 |
| abstract_inverted_index.the | 10, 32, 52, 68, 89, 95, 98, 112, 141, 151, 163 |
| abstract_inverted_index.also | 137 |
| abstract_inverted_index.data | 27, 33, 55 |
| abstract_inverted_index.from | 97, 143 |
| abstract_inverted_index.less | 119 |
| abstract_inverted_index.part | 64 |
| abstract_inverted_index.send | 29 |
| abstract_inverted_index.task | 23 |
| abstract_inverted_index.that | 81 |
| abstract_inverted_index.type | 39 |
| abstract_inverted_index.used | 12 |
| abstract_inverted_index.(DSP) | 128 |
| abstract_inverted_index.State | 125 |
| abstract_inverted_index.drain | 94 |
| abstract_inverted_index.faced | 76 |
| abstract_inverted_index.given | 138 |
| abstract_inverted_index.major | 69 |
| abstract_inverted_index.nodes | 21 |
| abstract_inverted_index.order | 92 |
| abstract_inverted_index.paper | 109 |
| abstract_inverted_index.these | 38, 78, 144 |
| abstract_inverted_index.which | 58, 74 |
| abstract_inverted_index.whose | 22 |
| abstract_inverted_index.wires | 118 |
| abstract_inverted_index.world | 2 |
| abstract_inverted_index.(DSDV) | 133 |
| abstract_inverted_index.actual | 154 |
| abstract_inverted_index.create | 103 |
| abstract_inverted_index.denial | 104 |
| abstract_inverted_index.energy | 45, 59, 96 |
| abstract_inverted_index.mostly | 49 |
| abstract_inverted_index.number | 18 |
| abstract_inverted_index.sensor | 7, 20, 120 |
| abstract_inverted_index.system | 160 |
| abstract_inverted_index.widely | 11 |
| abstract_inverted_index.Dynamic | 124 |
| abstract_inverted_index.Routing | 126, 132 |
| abstract_inverted_index.attacks | 85, 116, 152 |
| abstract_inverted_index.because | 56 |
| abstract_inverted_index.becomes | 61 |
| abstract_inverted_index.collect | 26 |
| abstract_inverted_index.contain | 17 |
| abstract_inverted_index.devices | 47 |
| abstract_inverted_index.effects | 113 |
| abstract_inverted_index.focuses | 110 |
| abstract_inverted_index.further | 36 |
| abstract_inverted_index.methods | 135 |
| abstract_inverted_index.network | 99, 142 |
| abstract_inverted_index.powered | 43 |
| abstract_inverted_index.prevent | 140, 162 |
| abstract_inverted_index.related | 71 |
| abstract_inverted_index.results | 146 |
| abstract_inverted_index.today's | 1 |
| abstract_inverted_index.vampire | 83, 115 |
| abstract_inverted_index.various | 14 |
| abstract_inverted_index.Protocol | 127 |
| abstract_inverted_index.applying | 158 |
| abstract_inverted_index.attacks. | 164 |
| abstract_inverted_index.launched | 87 |
| abstract_inverted_index.networks | 8, 16, 41, 79, 121 |
| abstract_inverted_index.problems | 70 |
| abstract_inverted_index.required | 50 |
| abstract_inverted_index.research | 4 |
| abstract_inverted_index.scenario | 156 |
| abstract_inverted_index.security | 73 |
| abstract_inverted_index.services | 106 |
| abstract_inverted_index.them.One | 66 |
| abstract_inverted_index.wireless | 6 |
| abstract_inverted_index.collected | 148 |
| abstract_inverted_index.computing | 5 |
| abstract_inverted_index.efficient | 46 |
| abstract_inverted_index.important | 63 |
| abstract_inverted_index.aggregator | 34 |
| abstract_inverted_index.collection | 53 |
| abstract_inverted_index.especially | 122 |
| abstract_inverted_index.management | 60 |
| abstract_inverted_index.networking | 155 |
| abstract_inverted_index.performing | 150 |
| abstract_inverted_index.adversaries | 90 |
| abstract_inverted_index.attacks.The | 145 |
| abstract_inverted_index.attacks.These | 84 |
| abstract_inverted_index.protocols.The | 134 |
| abstract_inverted_index.abruption.This | 108 |
| abstract_inverted_index.processing.For | 37 |
| abstract_inverted_index.Distance-Vector | 131 |
| abstract_inverted_index.operations.These | 15 |
| abstract_inverted_index.Destination-Sequenced | 130 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.67702207 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |