Vampire Attack Detection and Prevention in A Network Environment
Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 1
Abstract
Wireless Sensor Networks (WSNs) in this day and age are the method for correspondence. These contain hubs that go about as transmitter and collectors are inclined to various assaults prompting to various sorts of misfortunes. The asset exhaustion assault that is gotten vampire assault empties out the vitality out of the hubs abandoning them futile. These assaults are convention consistent, they are anything but difficult to execute. Since they are orthogonal in nature they can without much of a stretch barge in into any steering convention. They influence the whole network bringing on substantial loss of vitality. The proposed strategy distinguishes the nearness of vampire assault and the reenactment comes about demonstrate the vitality utilization for every situation.
Authors and Affiliations
Dr. Amit Sharma
Recent Trends And Challenges In Implementation Of Discrete Wavelet TransformArchitecture For Image Processing
The concept of reducing the cost requirement of the image processing and image storage is a major aspect. DWT plays a very important role in the compression of image by reducing the correlation between pixels. A research...
Viscous Dissipation and Radiation Effects on MHD Convective Flow Past A Vertical Porous Plate with Injection
The boundary layer steady flow and heat transfer towards a porous platein presence of a magnetic field and injection is presented in this analysis.Viscous dissipation and thermal radiationtermsare incorporated in thetemp...
A Brief Review on Bio-Medical Application of Radar
Since, The Radar Was Invented It Was Associated With The Military And Defenceapplications. The Revolution Ofradar Then Offered Medical And Industrial Application Which Ledto Intelligent Environment To Monitor And React O...
A Research Analysis on Social Media, ITC and the Technical Communicator
Preparing students of technical communication in the twenty-first century means training them to rhetorically utilize a wide variety of online tools. Technical communicators are now required to employ social media applic...
Deflouridation of Drinking water by Using Modified and Unmodified Bentonite from MinjinguMining Site in Tanzania
This study aims to assess the fluoride sorption by the use of Bentonitecategorized into four groups that isBentonite (B), activated Bentonite(8000C) (BAA), Bentonite impregnated with iron (BI) and Bentoniteimpreginated w...