Computer science help needed with Discussion Post Replies

Nov 5th, 2015
Price: $10 USD

Question description

  I chose an article that appeared in the International Journal of Innovative Research in Computer and Communication Engineering.  The article titled Vampire Attack Detection in Wireless Sensor Networks was written by Jayashree and Mohanaraj. With Halloween coming up, I thought it would be a fun to use this article.  The article focuses on the need for secured data transmission using wireless sensor networks.

  The article gives a little history on wireless sensor networks coming from the increased needs of military applications, and how now these networks are used across multiple industrial fields and consumer applications.  One example given talks about tracking a mobile target, and making sure the networks have energy efficiency to ensure a long network life.  The problem is that energy efficiency can provide a negative impact to the quality of service provided when tracking a mobile target.  “For example, forcing nodes to sleep may result in missing the passing target and lowering the tracking coverage. Therefore, energy efficient target tracking should improve the tradeoff between energy efficiency and tracking performance e.g., by improving energy efficiency at the expense of a relatively small loss on tracking performance” (Mohanaraj & Jayashree).

  The article then discusses how these networks are vulnerable to vampire attacks.  Vampire attacks work to deplete resources at a routing protocol layer, which disables wireless networks by quickly draining the battery power. “These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols” (Vasserman & Hopper). Unlike normal DoS attacks, Vampire attacks do not disrupt immediate availability but work over time to disable the entire network.  Because these attacks are not protocol specific, they are extremely hard to track and identify, which leads to more danger.

To combat these attacks, packets are tracked and verified to ensure the packet path can be validated.  Each node verifies the chain to ensure the packet has never travelled away from its destination in the logical address space.


Mohanraj, T., & Jayashree, S. (2015). Vampire attack detection in wireless sensor networks. International Journal of Innovative Research in Computer and Communication Engineering, 3(2), 751-756. doi:10.15680/ijircce.2015.0302022

Vasserman, E., & Hopper, N. (2013). Vampire attacks: Draining life from wireless ad-hoc sensor networks. IEEE Transactions on Mobile Computing, doi.2013.

What you need to do is... Just Read the above Posted Matter and Reply with your Suggestions to the Post or Add Some More Important Points regarding this above Topic. 


4 - 5 lines with Good Grammar 

Tutor Answer

(Top Tutor) writerelitepool
School: New York University

Studypool has helped 1,244,100 students

Review from student
" Excellent job "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1826 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors