SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS
AD HOC SENSOR NETWORKS
ABSTRACT:

Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of communication at
the routing or medium access control levels. This paper explores resource depletion attacks at the
routing protocol layer, which permanently disable networks by quickly draining nodes' battery
power. These "Vampire” attacks are not specific to any specific protocol, but rather rely on the
properties of many popular classes of routing protocols.

We find that all examined protocols are susceptible to Vampire attacks, which are devastating,
difficult to detect, and are easy to carry out using as few as one malicious insider sending only
protocol-compliant messages. In the worst case, a single Vampire can increase network-wide
energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods
to mitigate these types of attacks, including a new proof-of-concept protocol that provably
bounds the damage caused by Vampires during the packet forwarding phase.

More Related Content

PDF
Vampire attacks draining life from wireless ad hoc sensor networks
PPTX
Random key material distribution in wireless sensor networks
PPT
Security issues
PDF
Dotnet detection and localization of multiple spoofing attackers in wireless...
PPTX
Ids presentation
PPTX
Intrusion detection systems in wireless sensor networks
PPTX
Wireless sensor network security issues
PPT
Wireless sensor Network using Zero Knowledge Protocol ppt
Vampire attacks draining life from wireless ad hoc sensor networks
Random key material distribution in wireless sensor networks
Security issues
Dotnet detection and localization of multiple spoofing attackers in wireless...
Ids presentation
Intrusion detection systems in wireless sensor networks
Wireless sensor network security issues
Wireless sensor Network using Zero Knowledge Protocol ppt

What's hot (7)

PPTX
Security in Wireless Sensor Network
PPTX
Wireless Sensor Network
PDF
an overview of wireless local area networks and security system
PDF
Dynamic coverage of mobile sensor networks
PDF
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
PPTX
Wireless Sensor Network Security
PPT
wirelss sensor network
Security in Wireless Sensor Network
Wireless Sensor Network
an overview of wireless local area networks and security system
Dynamic coverage of mobile sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Wireless Sensor Network Security
wirelss sensor network
Ad

Viewers also liked (14)

PPT
Отчет об исполнении бюджета за I полугодие 2015 года
PDF
Dotnet eaack—a secure intrusion-detection system for mane ts
PDF
Livro go pro_eric_worre pdf
PDF
Página 14
PDF
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
DOC
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
PPTX
Universidad regional autonoma de los andes uniandes
PDF
Neucon brochure
PDF
Dotnet topology abstraction service for ip-vp ns
PDF
Dotnet distributed web systems performance forecasting using turning bands m...
PPTX
Píramo y tisbe
PDF
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
PDF
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
PDF
Dotnet mining semantic context information for intelligent video surveillanc...
Отчет об исполнении бюджета за I полугодие 2015 года
Dotnet eaack—a secure intrusion-detection system for mane ts
Livro go pro_eric_worre pdf
Página 14
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Universidad regional autonoma de los andes uniandes
Neucon brochure
Dotnet topology abstraction service for ip-vp ns
Dotnet distributed web systems performance forecasting using turning bands m...
Píramo y tisbe
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
Dotnet mining semantic context information for intelligent video surveillanc...
Ad

Similar to Dotnet vampire attacks draining life from wireless ad hoc sensor networks (20)

PDF
Java vampire attacks draining life from wireless ad hoc sensor networks
PDF
Iaetsd identifying and preventing resource depletion attack in
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
DOCX
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
PDF
Dotnet eaack—a secure intrusion-detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Dotnet cluster-based certificate revocation with vindication capability for ...
PDF
Cluster based certificate revocation with vindication capability for mobile a...
PDF
Dotnet cluster-based certificate revocation with vindication capability for ...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
PDF
Java eaack—a secure intrusion-detection system for mane ts
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Java eaack—a secure intrusion-detection system for mane ts
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Dotnet eaack—a secure intrusion-detection system for mane ts
Java vampire attacks draining life from wireless ad hoc sensor networks
Iaetsd identifying and preventing resource depletion attack in
Vampire attacks draining life from wireless ad hoc sensor networks
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
Dotnet eaack—a secure intrusion-detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Dotnet cluster-based certificate revocation with vindication capability for ...
Cluster based certificate revocation with vindication capability for mobile a...
Dotnet cluster-based certificate revocation with vindication capability for ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
Java eaack—a secure intrusion-detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts

Dotnet vampire attacks draining life from wireless ad hoc sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS ABSTRACT: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.