Collection of independent sensor nodes is primarily used as a combination of wireless detection and data networks are called wireless sensor networks (WSN). Wireless networks face many unacceptable security threats as these types of sensors are used primarily in many critical tasks such as military applications, claims management, environmental conditions, health applications, and more. Although the energy problem of the sensor network is more critical due to the absence of sensor nodes. The suggestion that other classes of source-based attacks are referred to as vampire attacks. Vampire attacks result in greater use of power during message delivery, which in turn prevents the entire network from quickly emptying node batteries. Because it uses protocol complaint messages to create attacks that make it difficult to detect and prevent. In this article, we intend to study and analyze vampire attacks and their effects on WSN. We also study cryptographic techniques using solutions for these types of attacks. This document explores the investigation of vampire attacks and their solution is provided in combination with the Minimum Spanning Encryption (MST) and RC5 techniques.
CITATION STYLE
R*, Ms. Poonkodi., & Selvam, Dr. N. S. (2019). Implementation of Wireless Sensor’s Integration Possibilities and Attacks on Wireless Network Control. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 5725–5730. https://doi.org/10.35940/ijrte.d8483.118419
Mendeley helps you to discover research relevant for your work.