SlideShare une entreprise Scribd logo
1  sur  2
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
OVERCOME VAMPIRE ATTACKS PROBLEM 
IN WIRELESS AD-HOC SENSOR NETWORK 
BY USING DISTANCE VECTOR PROTOCOLS 
ABSTRACT : 
Adhoc sensor wireless networks has been drawing interest among the 
researches in the direction sensing and pervasive computing. The 
security work in this area is priority and primarily focusing on denial of 
communication at the routing or medium access control levels. In this 
paper the attacks which is mainly focusing on routing protocol layer that 
kind of attacker is known as resource depletion attacks. This attacks 
causing the impact of persistently disabling the networks by drastically 
draining the node’s battery power. These “Vampire” attacks are not 
impacting any specific kind of protocols. Finding of vampire attacks 
inthe network is not a easy one. It’s very difficult to detect, devastating 
.A simple vampire presenting in the network can increasing network 
wide energy usage. We discuss some methods and alternative routing
protocols solution will be avoiding some sort of problems which 
causing by vampire attacks. 
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.

Contenu connexe

Plus de IEEEBEBTECHSTUDENTSPROJECTS

Plus de IEEEBEBTECHSTUDENTSPROJECTS (20)

2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
2014 IEEE DOTNET IMAGE PROCESSING PROJECT Click prediction-for-web-image-rera...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Image classification using multiscale...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Hierarchical prediction and context a...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
2014 IEEE JAVA IMAGE PROCESSING PROJECT Designing an-efficient-image encryption
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
2014 IEEE JAVA IMAGE PROCESSING PROJECT Click prediction-for-web-image-rerank...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Scalable and accurate prediction of ...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
2014 IEEE DOTNET SOFTWARE ENGINEERING PROJECT Automatic summarization of bug ...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Repent analyzing the nature of id...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Conservation of information softw...
 
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
2014 IEEE JAVA NETWORK SECURITY PROJECT Top k-query-result-completeness-verif...
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
2014 IEEE JAVA NETWORK SECURITY PROJECT Supporting privacy protection in pers...
 

Dernier

Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptx
Mostafa Mahmoud
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
AshwaniAnuragi1
 

Dernier (20)

Degrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptxDegrees of freedom for the robots 1.pptx
Degrees of freedom for the robots 1.pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Dr Mrs A A Miraje C Programming PPT.pptx
Dr Mrs A A Miraje C Programming PPT.pptxDr Mrs A A Miraje C Programming PPT.pptx
Dr Mrs A A Miraje C Programming PPT.pptx
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Study of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block DiagramStudy of Computer Hardware System using Block Diagram
Study of Computer Hardware System using Block Diagram
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C Programming
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 

2014 IEEE JAVA NETWORK SECURITY PROJECT Overcome vampire attacks problem in wireless ad hoc sensor network by using distance vector protocols

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS ABSTRACT : Adhoc sensor wireless networks has been drawing interest among the researches in the direction sensing and pervasive computing. The security work in this area is priority and primarily focusing on denial of communication at the routing or medium access control levels. In this paper the attacks which is mainly focusing on routing protocol layer that kind of attacker is known as resource depletion attacks. This attacks causing the impact of persistently disabling the networks by drastically draining the node’s battery power. These “Vampire” attacks are not impacting any specific kind of protocols. Finding of vampire attacks inthe network is not a easy one. It’s very difficult to detect, devastating .A simple vampire presenting in the network can increasing network wide energy usage. We discuss some methods and alternative routing
  • 2. protocols solution will be avoiding some sort of problems which causing by vampire attacks. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.