SlideShare a Scribd company logo
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
ABSTRACT:
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of communication at
the routing or medium access control levels. This paper explores resource depletion attacks at
the routing protocol layer, which permanently disable networks by quickly draining nodes’
battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely
on the properties of many popular classes of routing protocols. We find that all examined
protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are
easy to carry out using as few as one malicious insider sending only protocol-compliant
messages. In the worst case, a single Vampire can increase network-wide energy usage by a
factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these
types of attacks, including a new proof-of-concept protocol that provably bounds the damage
caused by Vampires during the packet forwarding phase.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery
to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead
using existing valid network paths and protocol compliant messages. Protocols that maximize
power efficiency are also inappropriate, since they rely on cooperative node behavior and
cannot optimize out malicious action.
DISADVANTAGES OF EXISTING SYSTEM:
 Power outages
 Due to Environmental disasters, loss in the information
 Lost productivity
 Various DOS attacks
 Secure level is low
 They do not address attacks that affect long-term availability.
PROPOSED SYSTEM:
This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities
of existing protocols to routing layer battery depletion attacks. We observe that security
measures to prevent Vampire attacks are orthogonal to those used to protect routing
infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do
not protect against Vampire attacks. Existing work on secure routing attempts to ensure that
adversaries cannot cause path discovery to return an invalid network path, but Vampires do not
disrupt or alter discovered paths, instead using existing valid network paths and protocol-
compliant messages. Protocols that maximize power efficiency are also inappropriate, since
they rely on cooperative node behavior and cannot optimize out malicious action. Second, we
show simulation results quantifying the performance of several representative protocols in the
presence of a single Vampire (insider adversary). Third, we modify an existing sensor network
routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
In proposed system we show simulation results quantifying the performance of several
representative protocols in the presence of a single Vampire. Then, we modify an existing
sensor network routing protocol to provably bound the damage from Vampire attacks during
packet forwarding.
ADVANTAGES OF PROPOSED SYSTEM:
 Protect from the vampire attacks
 Secure level is high
 Boost up the Battery power
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from
Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING,
VOL. 12, NO. 2, FEBRUARY 2013.

More Related Content

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Ii3415521555
DOCX
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
PDF
Wormhole attack detection algorithms
PPTX
Security in wireless sensor network
PPTX
Vampire attacks
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
Vampire attacks draining life from wireless ad hoc sensor networks
Ii3415521555
WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS
Wormhole attack detection algorithms
Security in wireless sensor network
Vampire attacks

What's hot (20)

DOCX
The three tier security scheme in wireless
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PPTX
6. security in wireless sensor netwoks
PPTX
Vasserman-TMC13-slide
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
Hop by hop message authentication chapter 1
PPT
security in wireless sensor networks
PDF
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
PPTX
Wireless Sensor Network Security
PPTX
Wireless sensor network security
PPTX
Wormhole attack
PDF
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
PDF
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
PPTX
Secure and efficient data transmission for cluster based wireless sensor network
DOC
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
PPTX
NetSim Webinar on Network Attacks and Detection
PPTX
ENSEIRB - Advanced Project
PPT
Security and privacy in Wireless Sensor Networks
PPTX
Trust Based Routing In wireless sensor Network
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
The three tier security scheme in wireless
Vampire attacks draining life from wireless ad hoc sensor networks
6. security in wireless sensor netwoks
Vasserman-TMC13-slide
Secure data aggregation technique for wireless sensor networks in the presenc...
Hop by hop message authentication chapter 1
security in wireless sensor networks
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Wireless Sensor Network Security
Wireless sensor network security
Wormhole attack
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Secure and efficient data transmission for cluster based wireless sensor network
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
NetSim Webinar on Network Attacks and Detection
ENSEIRB - Advanced Project
Security and privacy in Wireless Sensor Networks
Trust Based Routing In wireless sensor Network
Malicious attack detection and prevention in ad hoc network based on real tim...
Ad

Viewers also liked (9)

DOCX
A fast clustering based feature subset selection algorithm for high-dimension...
DOCX
JAVA 2013 IEEE PROJECT A fast clustering based feature subset selection algor...
PPTX
Cse 627 final project
PPTX
IEEE Projects & Final year Projects
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
PPTX
BEST PRACTICES FOR COMMUNICATING WITH KEY PROJECT STAKEHOLDERS A Case Study
DOC
Project report on dtmf based door opening system
PDF
Org change communications strategy & tips
PDF
Student Attendance System
A fast clustering based feature subset selection algorithm for high-dimension...
JAVA 2013 IEEE PROJECT A fast clustering based feature subset selection algor...
Cse 627 final project
IEEE Projects & Final year Projects
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
BEST PRACTICES FOR COMMUNICATING WITH KEY PROJECT STAKEHOLDERS A Case Study
Project report on dtmf based door opening system
Org change communications strategy & tips
Student Attendance System
Ad

Similar to DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wireless ad hoc sensor networks (20)

DOCX
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Java vampire attacks draining life from wireless ad hoc sensor networks
PDF
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Dotnet vampire attacks draining life from wireless ad hoc sensor networks
PDF
A044060107
PDF
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
PDF
Iaetsd identifying and preventing resource depletion attack in
PDF
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
PDF
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
PPTX
Vampireattacks 131109081959-phpapp02
PPTX
Vampire attack in wsn
PDF
Limiting the energy drain in wireless ad hoc sensor networks
PDF
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
PDF
Dr2645024509
PDF
Kw2418391845
PDF
DOC
Routing security in ad hoc wireless network
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
Vampire attacks draining life from wireless ad hoc sensor networks
Java vampire attacks draining life from wireless ad hoc sensor networks
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
Dotnet vampire attacks draining life from wireless ad hoc sensor networks
A044060107
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
Iaetsd identifying and preventing resource depletion attack in
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
Vampireattacks 131109081959-phpapp02
Vampire attack in wsn
Limiting the energy drain in wireless ad hoc sensor networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
Dr2645024509
Kw2418391845
Routing security in ad hoc wireless network

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Spectroscopy.pptx food analysis technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Spectroscopy.pptx food analysis technology
The AUB Centre for AI in Media Proposal.docx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Building Integrated photovoltaic BIPV_UPV.pdf

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wireless ad hoc sensor networks

  • 1. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks ABSTRACT: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. EXISTING SYSTEM: Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. DISADVANTAGES OF EXISTING SYSTEM:  Power outages  Due to Environmental disasters, loss in the information  Lost productivity  Various DOS attacks  Secure level is low  They do not address attacks that affect long-term availability. PROPOSED SYSTEM: This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities of existing protocols to routing layer battery depletion attacks. We observe that security measures to prevent Vampire attacks are orthogonal to those used to protect routing infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do not protect against Vampire attacks. Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol- compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. Second, we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire (insider adversary). Third, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
  • 3. In proposed system we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire. Then, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding. ADVANTAGES OF PROPOSED SYSTEM:  Protect from the vampire attacks  Secure level is high  Boost up the Battery power SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.  Database : MYSQL
  • 4. REFERENCE: Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013.