Vampire Attack Detection and Prevention in A Network Environment

Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 1

Abstract

Wireless Sensor Networks (WSNs) in this day and age are the method for correspondence. These contain hubs that go about as transmitter and collectors are inclined to various assaults prompting to various sorts of misfortunes. The asset exhaustion assault that is gotten vampire assault empties out the vitality out of the hubs abandoning them futile. These assaults are convention consistent, they are anything but difficult to execute. Since they are orthogonal in nature they can without much of a stretch barge in into any steering convention. They influence the whole network bringing on substantial loss of vitality. The proposed strategy distinguishes the nearness of vampire assault and the reenactment comes about demonstrate the vitality utilization for every situation.

Authors and Affiliations

Dr. Amit Sharma

Keywords

Related Articles

Recent Trends And Challenges In Implementation Of Discrete Wavelet TransformArchitecture For Image Processing

The concept of reducing the cost requirement of the image processing and image storage is a major aspect. DWT plays a very important role in the compression of image by reducing the correlation between pixels. A research...

Viscous Dissipation and Radiation Effects on MHD Convective Flow Past A Vertical Porous Plate with Injection

The boundary layer steady flow and heat transfer towards a porous platein presence of a magnetic field and injection is presented in this analysis.Viscous dissipation and thermal radiationtermsare incorporated in thetemp...

A Brief Review on Bio-Medical Application of Radar

Since, The Radar Was Invented It Was Associated With The Military And Defenceapplications. The Revolution Ofradar Then Offered Medical And Industrial Application Which Ledto Intelligent Environment To Monitor And React O...

A Research Analysis on Social Media, ITC and the Technical Communicator

Preparing students of technical communication in the twenty-first century means training them to rhetorically utilize a wide variety of online tools. Technical communicators are now required to employ social media applic...

Deflouridation of Drinking water by Using Modified and Unmodified Bentonite from MinjinguMining Site in Tanzania

This study aims to assess the fluoride sorption by the use of Bentonitecategorized into four groups that isBentonite (B), activated Bentonite(8000C) (BAA), Bentonite impregnated with iron (BI) and Bentoniteimpreginated w...

Download PDF file
  • EP ID EP396007
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Dr. Amit Sharma (2018). Vampire Attack Detection and Prevention in A Network Environment. International Journal of Engineering and Science Invention, 7(1), 83-87. https://www.europub.co.uk/articles/-A-396007