SlideShare a Scribd company logo
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
ABSTRACT:
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of communication at
the routing or medium access control levels. This paper explores resource depletion attacks at
the routing protocol layer, which permanently disable networks by quickly draining nodes’
battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely
on the properties of many popular classes of routing protocols. We find that all examined
protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are
easy to carry out using as few as one malicious insider sending only protocol-compliant
messages. In the worst case, a single Vampire can increase network-wide energy usage by a
factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these
types of attacks, including a new proof-of-concept protocol that provably bounds the damage
caused by Vampires during the packet forwarding phase.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery
to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead
using existing valid network paths and protocol compliant messages. Protocols that maximize
power efficiency are also inappropriate, since they rely on cooperative node behavior and
cannot optimize out malicious action.
DISADVANTAGES OF EXISTING SYSTEM:
 Power outages
 Due to Environmental disasters, loss in the information
 Lost productivity
 Various DOS attacks
 Secure level is low
 They do not address attacks that affect long-term availability.
PROPOSED SYSTEM:
This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities
of existing protocols to routing layer battery depletion attacks. We observe that security
measures to prevent Vampire attacks are orthogonal to those used to protect routing
infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do
not protect against Vampire attacks. Existing work on secure routing attempts to ensure that
adversaries cannot cause path discovery to return an invalid network path, but Vampires do not
disrupt or alter discovered paths, instead using existing valid network paths and protocol-
compliant messages. Protocols that maximize power efficiency are also inappropriate, since
they rely on cooperative node behavior and cannot optimize out malicious action. Second, we
show simulation results quantifying the performance of several representative protocols in the
presence of a single Vampire (insider adversary). Third, we modify an existing sensor network
routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
In proposed system we show simulation results quantifying the performance of several
representative protocols in the presence of a single Vampire. Then, we modify an existing
sensor network routing protocol to provably bound the damage from Vampire attacks during
packet forwarding.
ADVANTAGES OF PROPOSED SYSTEM:
 Protect from the vampire attacks
 Secure level is high
 Boost up the Battery power
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from
Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING,
VOL. 12, NO. 2, FEBRUARY 2013.
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

PPTX
Vasserman-TMC13-slide
PPTX
Vampire attacks
PDF
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
PPTX
NetSim Webinar on Network Attacks and Detection
PPTX
Threats in wireless sensor networks
PPTX
A survey on complex wormhole attack in wireless
PPTX
Black hole attack
PDF
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Vasserman-TMC13-slide
Vampire attacks
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
NetSim Webinar on Network Attacks and Detection
Threats in wireless sensor networks
A survey on complex wormhole attack in wireless
Black hole attack
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...

What's hot (17)

PDF
Blackhole attack in Manet
PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
Node detection technique for node replication attack in mobile sensor network
PPTX
Protocol manet
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
PDF
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
PPT
Attacks in MANET
PDF
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
PDF
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
PPTX
Presentation1
PDF
International Journal of Engineering and Science Invention (IJESI)
PPTX
Vampire attack in wsn
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
PDF
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
PDF
Attacks on mobile ad hoc networks
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
PPTX
Blackhole Attck detection in AODV Protocol
Blackhole attack in Manet
Wormhole attack detection algorithms in wireless network coding systems
Node detection technique for node replication attack in mobile sensor network
Protocol manet
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Attacks in MANET
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
Presentation1
International Journal of Engineering and Science Invention (IJESI)
Vampire attack in wsn
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
Attacks on mobile ad hoc networks
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Blackhole Attck detection in AODV Protocol
Ad

Similar to Vampire attacks draining life from wireless ad hoc sensor networks (20)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Java vampire attacks draining life from wireless ad hoc sensor networks
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Iaetsd identifying and preventing resource depletion attack in
PDF
International Journal of Computational Engineering Research(IJCER)
DOCX
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...
DOCX
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
PDF
Wireless Network Security Software Wireless Network Security Software
PDF
Ii3415521555
PDF
Enhanced Secure Routing Model for MANET
PDF
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
PDF
Internets Manage Communication Procedure and Protection that Crash on Servers
PDF
Investigation of detection & prevention sinkhole attack in manet
PDF
Ar34261268
PDF
A044060107
PDF
Limiting self propagating malware based
PPTX
Mobile slide
PDF
Different Prediction Methods For Route Recovery In MANET
PDF
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
Vampire attacks draining life from wireless ad hoc sensor networks
Java vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
Iaetsd identifying and preventing resource depletion attack in
International Journal of Computational Engineering Research(IJCER)
JPN1402 A Study on False Channel Condition Reporting Attacks in Wireless Ne...
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
Wireless Network Security Software Wireless Network Security Software
Ii3415521555
Enhanced Secure Routing Model for MANET
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
Internets Manage Communication Procedure and Protection that Crash on Servers
Investigation of detection & prevention sinkhole attack in manet
Ar34261268
A044060107
Limiting self propagating malware based
Mobile slide
Different Prediction Methods For Route Recovery In MANET
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mushroom cultivation and it's methods.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Machine Learning_overview_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TLE Review Electricity (Electricity).pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
Mushroom cultivation and it's methods.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
A comparative analysis of optical character recognition models for extracting...
OMC Textile Division Presentation 2021.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Digital-Transformation-Roadmap-for-Companies.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Machine Learning_overview_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

Vampire attacks draining life from wireless ad hoc sensor networks

  • 1. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks ABSTRACT: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. DISADVANTAGES OF EXISTING SYSTEM:  Power outages  Due to Environmental disasters, loss in the information  Lost productivity  Various DOS attacks  Secure level is low  They do not address attacks that affect long-term availability. PROPOSED SYSTEM: This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities of existing protocols to routing layer battery depletion attacks. We observe that security measures to prevent Vampire attacks are orthogonal to those used to protect routing infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do not protect against Vampire attacks. Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol- compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. Second, we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire (insider adversary). Third, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
  • 3. In proposed system we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire. Then, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding. ADVANTAGES OF PROPOSED SYSTEM:  Protect from the vampire attacks  Secure level is high  Boost up the Battery power SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.  Database : MYSQL
  • 4. REFERENCE: Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013. DOMAIN: WIRELESS NETWORK PROJECTS