This document discusses vampire attacks in low-power wireless ad hoc sensor networks, highlighting their ability to drain battery power through existing routing protocols without altering paths. Such attacks are devastating, subtle, and easy to carry out, with every examined protocol found to be susceptible. The paper presents a new protocol to mitigate these attacks and offers simulation results to illustrate the performance of various protocols against a single insider adversary.