SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS
AD HOC SENSOR NETWORKS
ABSTRACT:

Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of communication at
the routing or medium access control levels. This paper explores resource depletion attacks at the
routing protocol layer, which permanently disable networks by quickly draining nodes' battery
power. These "Vampire” attacks are not specific to any specific protocol, but rather rely on the
properties of many popular classes of routing protocols.

We find that all examined protocols are susceptible to Vampire attacks, which are devastating,
difficult to detect, and are easy to carry out using as few as one malicious insider sending only
protocol-compliant messages. In the worst case, a single Vampire can increase network-wide
energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods
to mitigate these types of attacks, including a new proof-of-concept protocol that provably
bounds the damage caused by Vampires during the packet forwarding phase.

More Related Content

What's hot

Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
ecway
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Harshal Ladhe
 

What's hot (7)

Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networksIntrusion detection in homogeneous and heterogeneous wireless sensor networks
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 

Viewers also liked

Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Ecwaytech
 
Livro go pro_eric_worre pdf
Livro go pro_eric_worre pdfLivro go pro_eric_worre pdf
Livro go pro_eric_worre pdf
Cicero galvao
 
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Ecwaytech
 
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Ecwayt
 
Dotnet topology abstraction service for ip-vp ns
Dotnet  topology abstraction service for ip-vp nsDotnet  topology abstraction service for ip-vp ns
Dotnet topology abstraction service for ip-vp ns
Ecwaytech
 
Dotnet distributed web systems performance forecasting using turning bands m...
Dotnet  distributed web systems performance forecasting using turning bands m...Dotnet  distributed web systems performance forecasting using turning bands m...
Dotnet distributed web systems performance forecasting using turning bands m...
Ecwaytech
 
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Ecwaytech
 
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
Dotnet  receiver-driven adaptive enhancement layer switching algorithm for sc...Dotnet  receiver-driven adaptive enhancement layer switching algorithm for sc...
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
Ecwaytech
 
Dotnet mining semantic context information for intelligent video surveillanc...
Dotnet  mining semantic context information for intelligent video surveillanc...Dotnet  mining semantic context information for intelligent video surveillanc...
Dotnet mining semantic context information for intelligent video surveillanc...
Ecwaytech
 

Viewers also liked (14)

Отчет об исполнении бюджета за I полугодие 2015 года
Отчет об исполнении бюджета за I полугодие 2015 годаОтчет об исполнении бюджета за I полугодие 2015 года
Отчет об исполнении бюджета за I полугодие 2015 года
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Livro go pro_eric_worre pdf
Livro go pro_eric_worre pdfLivro go pro_eric_worre pdf
Livro go pro_eric_worre pdf
 
Página 14
Página 14Página 14
Página 14
 
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
 
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...Dynamic wireless sensor networks for real time safeguard of workers exposed t...
Dynamic wireless sensor networks for real time safeguard of workers exposed t...
 
Universidad regional autonoma de los andes uniandes
Universidad regional autonoma de los   andes uniandesUniversidad regional autonoma de los   andes uniandes
Universidad regional autonoma de los andes uniandes
 
Neucon brochure
Neucon brochureNeucon brochure
Neucon brochure
 
Dotnet topology abstraction service for ip-vp ns
Dotnet  topology abstraction service for ip-vp nsDotnet  topology abstraction service for ip-vp ns
Dotnet topology abstraction service for ip-vp ns
 
Dotnet distributed web systems performance forecasting using turning bands m...
Dotnet  distributed web systems performance forecasting using turning bands m...Dotnet  distributed web systems performance forecasting using turning bands m...
Dotnet distributed web systems performance forecasting using turning bands m...
 
Píramo y tisbe
Píramo y tisbePíramo y tisbe
Píramo y tisbe
 
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...Dotnet  gaussian versus uniform distribution for intrusion detection in wirel...
Dotnet gaussian versus uniform distribution for intrusion detection in wirel...
 
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
Dotnet  receiver-driven adaptive enhancement layer switching algorithm for sc...Dotnet  receiver-driven adaptive enhancement layer switching algorithm for sc...
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
 
Dotnet mining semantic context information for intelligent video surveillanc...
Dotnet  mining semantic context information for intelligent video surveillanc...Dotnet  mining semantic context information for intelligent video surveillanc...
Dotnet mining semantic context information for intelligent video surveillanc...
 

Similar to Dotnet vampire attacks draining life from wireless ad hoc sensor networks

Java vampire attacks draining life from wireless ad hoc sensor networks
Java  vampire attacks draining life from wireless ad hoc sensor networksJava  vampire attacks draining life from wireless ad hoc sensor networks
Java vampire attacks draining life from wireless ad hoc sensor networks
ecwayerode
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack in
Iaetsd Iaetsd
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecwaytech
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
ecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecwaytech
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Ecwayt
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecwayt
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
Ecwayt
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
Ecwaytech
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
ecwayprojects
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecway Technologies
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Ecway Technologies
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
ecway
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
Ecway Technologies
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
Ecway Technologies
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
ecwayerode
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
ecway
 

Similar to Dotnet vampire attacks draining life from wireless ad hoc sensor networks (20)

Java vampire attacks draining life from wireless ad hoc sensor networks
Java  vampire attacks draining life from wireless ad hoc sensor networksJava  vampire attacks draining life from wireless ad hoc sensor networks
Java vampire attacks draining life from wireless ad hoc sensor networks
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack in
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
 
Dotnet cluster-based certificate revocation with vindication capability for ...
Dotnet  cluster-based certificate revocation with vindication capability for ...Dotnet  cluster-based certificate revocation with vindication capability for ...
Dotnet cluster-based certificate revocation with vindication capability for ...
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Dotnet eaack—a secure intrusion-detection system for mane ts
Dotnet  eaack—a secure intrusion-detection system for mane tsDotnet  eaack—a secure intrusion-detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Java eaack—a secure intrusion-detection system for mane ts
Java  eaack—a secure intrusion-detection system for mane tsJava  eaack—a secure intrusion-detection system for mane ts
Java eaack—a secure intrusion-detection system for mane ts
 
Eaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane tsEaack—a secure intrusion detection system for mane ts
Eaack—a secure intrusion detection system for mane ts
 

Dotnet vampire attacks draining life from wireless ad hoc sensor networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS ABSTRACT: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.