SlideShare a Scribd company logo
1 of 22
VAMPIRE ATTACK IN WSN: A DETECTION
AND PREVENTION APPROACH AGAINST
VAMPIRE
Presented By:
Richa Kumari
Outline
 Introduction of WSN
Security Threats
Security Requirement
 Vampire Attack
 Related Work
 Proposed Work
 Conclusion and Future Work
 References
Introduction
a) Wireless Sensor Network
Sometimes WSN is also called WSAN, wireless sensor and actuator
networks. WSAN is a collection of autonomous sensors which are
distributed in a specific area to monitor environmental conditions,
such as pressure, temperature and sound etc. they co-ordinately
transfer their information over the network to a destination node.
Figure : Sensor Node Architecture
Introduction Cont’d…
b) Characteristics of WSN
• Large no of nodes: A wireless sensor network uses huge amount
of sensor nodes.
• Unreliable Communication: In WSN routing is done by using
connection-less protocol so obviously communication will be
unreliable.
• Heterogeneity of nodes: The WSN have sensor nodes with
different abilities, such as various transmission or sensing ranges,
so that network provides more resilience in distribution.
• Battery powered: The power is needed to every sensor node to
receive packet and to perform the computation on it.
• Very limited resources: Each sensor nodes in WSN have limited
resource like memory (48K Program Memory and 1M flash
storage), 16 bit 8 MHz CPU with 10K RAM.
Introduction Cont’d…
• Scalability: It is the capability of a WSN to handle a growing no.
of sensor node.
• Node for common task: Each sensor node performs some task
like collecting the information, computation and communicating
with other nodes in the network.
• In network data processing: This technique of WSN is very
common and also very important in which an intermediate node
has a special transmission function to aggregate the sensing data
from the source and pass the resultant data to sink node [14].
• Self-Organization: Due to autonomous feature of the sensor
network each nodes can organize itself during ambiguous
situations [11].
Introduction Cont’d…
c) Application of WSN
• Area monitoring: The WSN is deployed over an area where some
aspect is to be observed and then transmit that information to the
control unit.
• Health monitoring: In medical science wearable and implanted
these two type of applications.
• Air pollution monitoring: To measure the concentration of
serious gases in cities, the WSN is used to do this.
• Forest fire detection: The Wireless Sensor Network can be
installed in a forest to detect the fire in particular coverage area. In
this process sensors measure the temperature, humidity and gases
which are produced during fire.
• Natural disaster prevention: WSN have strongly been set up in
water sources like rivers, lacks where variation in the water levels
observed in real time.
Security Threats
• There are different threats that target WSN [3] [7]. Which are
categorise as follows-
• Common Attacks: In WSN, wireless transmission medium is used
for communication so it is easy to present many types of attacks
like: Active attack (data modification, data injection, delay, DoS)
and passive attack (traffic analysis, eavesdropping).
• Denial of Service Attacks (DoS [4] [16]): These type of attacks
prevent the normal use of communication functionality. This attack
may suppress all packet directed to a particular destination e.g.
jamming attack [15], Target the power of a nodes e.g. power-
exhaustion, vampire attack.
• Node Compromise: When a node come into network attacker
extract vital information from a node like routing information,
data, access control, security key etc. these attacks are These
attacks are more dominant than other attacks.
Security Threats cont’d…
• Side-channel Attacks: Attacker can observe some real activity of
a node like electromagnetic flow of data whenever they implement
encryption or decryption. After capturing this information attacker
can easily extract secret key.
• Impersonation Attacks: There are two types of impersonation
attack. One is Sybil attack in which adversary creates multiple fake
identities and other is replication attack in which adversary create
duplicates of the same identity.
• Protocol-specific Attacks: In WSN some protocols are essential
to perform some activity in the network. These protocols like data
aggregation, routing and time synchronization are pointed by
specific attacks that objective to influence the internal network
services.
Security Requirement
There is need to use some security mechanism to avoid attack in
WSN [5] [7].
• Confidentiality: It ensure that a given information must not be
reveal by anyone other than the intended sender and receiver.
• Integrity: This security service stated that the data receive by the
receiver are absolute as sent by an authorize sender.
• Authorization: This security service ensure that only the
authorized entities (e.g.: sensor nodes and base station) can be able
to execute functions in the network like data gathering, routing,
processing and controlling the system.
• Authentication: It allows a recipient to verify that the data is
really sent by the authorised sender. In sensor network this security
services is quite significant.
• Auditing: Important information which is observed from
environment by the sensor nodes must be stored by nodes.
Security Requirement cont’d…
• Availability: The principle of this property is that network
services or resource should be always available to the authentic
users when they needed.
• Freshness [7]: In WSN Sensor node collect the real information
from environment at every moment and transmit it to base stations.
So this information must be recent.
• Forward and Backward Secrecy: There are two properties
needed whenever a new node join a network and a sensor node
fail. First is forward secrecy where a sensor node should not be
able to read any future messages after it leaves the network and the
other one is backward secrecy, where a joining sensor node should
not be able to read any previously transmitted message.
• Privacy and Anonymity: This property ensure that the location
and identities of WSN entities (sensor node and base stations)
should be hidden or protected from the outsiders.
Vampire Attack
• The vampire attack is the class of Denial-of-Service attack.
• Denial-of-Services in network is cause by consuming the power of
the sensor node. It is also called power draining attacks because of
this attack consume power of sensor nodes and disable the
network.
• we can categorise vampire attack into two.
a) Vampire Attack on Stateless Protocol
b) Vampire Attacks on Stateful Protocol
Vampire Attack Cont’d…
a) Vampire Attack on Stateless Protocol
• Carousel Attack: In carousel attack, an attacker compose a packet
with a path that contain series of loops of that path, so that same of
nodes will traverse by the single packet many times[9] as shown in
Figure.
Figure 1: Carousel Attack
Vampire Attack Cont’d…
• Stretch Attack: In stretch attack, intruder build up fake long
source route. So that the packets move through large number of
node rather than the excellent number of nodes as shown in Figure.
Figure 2: Stretch Attack
Vampire Attack Cont’d…
b) Vampire attacks on Stateful Protocol
Stateful routing protocols in which network topology and its state
are already known by the nodes so local forwarding decisions at
each is done by using stored state.
• Directional Antenna Attack: In this type of attack intruder have
small control over the packet progress when forwarding decisions
are made independently by each node but by using directional
antenna they can still waste energy[10].
• Malicious Discovery Attacks: AODV and DSR routing
algorithms are vulnerable to vampire, when route discovery initiate
by the node at any time, not just during change in a topology.
There are many ways for the malicious node to activate topology
change: it may simply falsely claim that a link is down, or claim a
new link to a non-existent node.
Related Work
1. Eugene y. vasserman et. al. [6], Describe PLGP protocol which is
developed By Parno, Luk, Gaustad and Perrig to prevent the
vampire attack. PLGP have mainly two phases, first is Topology
discovery Phase and other is Packet forwarding phase.
2. K. Vanitha and V.dhivya et. al. [8], They have invented a routing
protocol to Prevent from Vampire Attacks in WSN, name is
Valuable Secure protocol. It has mainly three phases, first is
network configuration phase, second is key management and last
one is communication phase.
3. B. Umakanth and J. Damodhar et. al. [13], Describe the EWMA
(Energy Weighted Monitoring Algorithm) to detect the vampire
attack. It has mainly two phases, first is network configuration and
other is communication phase. First phase is responsible for
creating an excellent routing path from source to sink. Second
phase perform aggregation of the packet transmission to avoids the
same packets.
Related Work Cont’d…
4. Ashish Patil and Rahul Gaikwad et. al.[2], Describe a method to
prevent vampire attack by using EWMA and finding corresponding
trust value of each node. For preventing vampire attack first detect
carousal and stretch attack. After detection of carousal and stretch
attack reduce their impact in wireless sensor networks by using
energy weight monitoring algorithm (EWMA). Then finding trust
value of each node in the network for performing routing operation.
5. Amee A. Patel and Sunil J. Soni et. al [1], Describe a method for
detection and prevention against vampire attack in AODV routing
protocol. The main goal of approach is defending the energy
draining of nodes in wireless sensor network against vampire attack
and increase the life time of network.
6. Shrikant C. Chumble1 and M. M. Ghonge et. al.[12], Describe
the vulnerability to the vampire attack on exiting routing protocol
like AODV even they design to be secure routing. The author also
proposed, vampire attack removal protocol (VARP).
Proposed Work
In this approach we add one extra field in the routing table at each
node and in data packet that is Bcast_id for AODV routing protocol
to detect the directional antenna attack.
Step 1: Whenever sensor node want to send the information, first it
will check its routing table.
• If path available in routing table then goto step 3.
• Otherwise it will generate the packet RREQ with Bcast_id and
broadcast this packet into the network in read only mode.
Step 2: The intermediate nodes either generates RREP with same
Bcast_id as RREQ or rebroadcast RREQ. Redundant RREQs are
dropped by these node.
• If these node have a path to destination in their routing table then
generates RREP and goto step 3.
• Otherwise rebroadcast the RREQ packet.
Proposed Work Cont’d…
Step 3: Node will unicast a ‘route_path_alert’ packet in that forward
path with fields <dest_addr, source_addr, bcast_id >.
So that all intermediate nodes can update their bcast_id field in
routing table corresponding to the source and destination entries.
Step 4: After establish or alert the reverse and forward path, source
node can transmit the information to destination.
Now source node prepare data packet including Bcast_id (read only
mode) and unicast this packet on particular selected path.
Step 5: All Intermediate nodes match bcast_id of packet and the
corresponding stored bcast_id in routing table.
If bcast_id matches then this node forward the data packet otherwise
send message to trusted authorise party that the particular previous
node is vampire node.
Conclusion and Future Work
• Various new routing protocol against vampire attack and methods
to detect or prevent the vampire in AODV routing protocol are
mentioned in related work.
• This paper provide a different approach for detect and prevent the
vampire attack by adding one extra variable in routing table and
data packet. After that performs some computation on that variable
to detect and prevent this attack.
• The simulation of above proposed algorithm is left for future work.
References
1. Amee A. Patel and Sunil J. Soni, “A Novel Proposal for Defending Against Vampire
Attack in WSN” International Conference on Communication Systems and Network
Technologies,pp: 624-627, DOI 10.1109/CSNT in 2015.
2. Ashish Patil and Rahul Gaikwad, “Preventing Vampire Attack in Wireless Sensor
Network by using Trust” International Journal of Engineering Research & Technology
ISSN: 2278-0181 Vol. 4 pp: 254-258, Issue 06, June-2015.
3. C. Karlof , D. Wagner, “Secure routing in wireless sensor networks attacks And
countermeasures” in proc. Of 1st IEEE Int. workshop on sensor network Protocols and
applications (SNPA’03), pp. 113-127, May 2003.
4. D.R. Raymond, R.C. Marchany, M.I. Brown¯eld, and S.F. Midki, “Effects of Denial-of-
Sleep Attacks on Wireless Sensor Network MAC Protocols” IEEE Trans- actions on
Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009.
5. Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges”
IJCIT, vol. 2, issue 1, pp. 62-67, 2011.
6. Eugene Y. Vasserman and Nicholas Hopper, “Vampire Attacks: Draining Life from
Wireless Ad Hoc Sensor Network” Ieee Transactions On Mobile Computing, Vol. 12, pp:
318 – 332, No. 2, February 2013.
7. J. Lopez, R. Roman, and C. Alcaraz, “Analysis of Security Threats, Requirements,
Technologies and Standards in Wireless Sensor Networks” Foundations of Security
Analysis and Design 2009, LNCS vol. 5705, pp. 289-338, 2009.
8. K.Vanitha, and V.Dhivya, “A Valuable Secure Protocol to Prevent Vampire Attacks in
Wireless Ad Hoc Sensor Networks” IEEE International Conference on Innovations in
Engineering and Technology Vol. 3, pp: 2441-2446, Special Issue 3, March 2014.
References Cont’d…
9. P.Rajipriyadharshini and V.Venkatakrishnan, S.Suganya and A .Masanam, “Vampire Attacks
Deploying Resources in Wireless Sensor Networks” International Journal of Computer Science
and Information Technologies, Vol. 5 (3), 2014, pp: 2951-2953 ; ISSN: 0975-9646.
10. Richa kumari, Pankaj Sharma, “A Literature Survey on Detection and Prevention against
Vampire Attack in WSN” international conference on computer, communication &
computational sciences [IC4S 2016], pp:122-126, Ajmer (Raj.) August 2016.
11. Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari, “Security issues in wireless sensor networks”
Journal of Information Systems and Communication, vol. 1, pp-01-06, issue 2, 2010.
12. Tawseef Ahmad Naqishbandi and Imthyaz Sheriff C, “A Resilient Strategy against Energy
Attacks in Ad-Hoc WSN and Future IoT” International Journal of Advanced Research in
Computer Science and Software Engineering Vol. 4, Issue 2, February 2014, pp: 766-773, ISSN:
2277 128X.
13. Umakant, and J. Damodhar, “Resource Consumption Attacks in Wireless Ad Hoc Sensor
Networks” International Journal of Engineering Research ISSN: 2319 6890, Volume No.3 Issue
No: Special 2, pp: 107-111 22 March 2014.
14. V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, and M. Welsh, “Simulating the Power
Consumption of Large-Scale Sensor Network Applications” Proceedings of the 2nd
International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 188-
200, Baltimore (USA), August 2004.
15. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting
Jamming Attacks in Wireless Networks” Proceedings of the 6th ACM international symposium
on Mobile ad hoc networking and computing, pp. 46-57, Urbana-Champaign (USA), May 2005.
16. Y.W. Law, M. Palaniswami, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy,
“Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols”
ACM Transactions on Sensor Networks, vol. 5, no. 1, pp. 6:1-6:38, 2009.
Vampire attack in wsn

More Related Content

What's hot

6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
Muqeed Abdul
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
Zdravko Danailov
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
Meena S Pandi
 

What's hot (20)

6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
N0704075079
N0704075079N0704075079
N0704075079
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Grayhole
GrayholeGrayhole
Grayhole
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Cryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic networkCryptography based misbehavior detection for opportunistic network
Cryptography based misbehavior detection for opportunistic network
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemula
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 

Similar to Vampire attack in wsn

eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 

Similar to Vampire attack in wsn (20)

Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...Iisrt 6-node detection technique for node replication attack in mobile sensor...
Iisrt 6-node detection technique for node replication attack in mobile sensor...
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor NetworksSecurity Attacks and its Countermeasures in Wireless Sensor Networks
Security Attacks and its Countermeasures in Wireless Sensor Networks
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
D0961927
D0961927D0961927
D0961927
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 

Recently uploaded

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

Vampire attack in wsn

  • 1. VAMPIRE ATTACK IN WSN: A DETECTION AND PREVENTION APPROACH AGAINST VAMPIRE Presented By: Richa Kumari
  • 2. Outline  Introduction of WSN Security Threats Security Requirement  Vampire Attack  Related Work  Proposed Work  Conclusion and Future Work  References
  • 3. Introduction a) Wireless Sensor Network Sometimes WSN is also called WSAN, wireless sensor and actuator networks. WSAN is a collection of autonomous sensors which are distributed in a specific area to monitor environmental conditions, such as pressure, temperature and sound etc. they co-ordinately transfer their information over the network to a destination node. Figure : Sensor Node Architecture
  • 4. Introduction Cont’d… b) Characteristics of WSN • Large no of nodes: A wireless sensor network uses huge amount of sensor nodes. • Unreliable Communication: In WSN routing is done by using connection-less protocol so obviously communication will be unreliable. • Heterogeneity of nodes: The WSN have sensor nodes with different abilities, such as various transmission or sensing ranges, so that network provides more resilience in distribution. • Battery powered: The power is needed to every sensor node to receive packet and to perform the computation on it. • Very limited resources: Each sensor nodes in WSN have limited resource like memory (48K Program Memory and 1M flash storage), 16 bit 8 MHz CPU with 10K RAM.
  • 5. Introduction Cont’d… • Scalability: It is the capability of a WSN to handle a growing no. of sensor node. • Node for common task: Each sensor node performs some task like collecting the information, computation and communicating with other nodes in the network. • In network data processing: This technique of WSN is very common and also very important in which an intermediate node has a special transmission function to aggregate the sensing data from the source and pass the resultant data to sink node [14]. • Self-Organization: Due to autonomous feature of the sensor network each nodes can organize itself during ambiguous situations [11].
  • 6. Introduction Cont’d… c) Application of WSN • Area monitoring: The WSN is deployed over an area where some aspect is to be observed and then transmit that information to the control unit. • Health monitoring: In medical science wearable and implanted these two type of applications. • Air pollution monitoring: To measure the concentration of serious gases in cities, the WSN is used to do this. • Forest fire detection: The Wireless Sensor Network can be installed in a forest to detect the fire in particular coverage area. In this process sensors measure the temperature, humidity and gases which are produced during fire. • Natural disaster prevention: WSN have strongly been set up in water sources like rivers, lacks where variation in the water levels observed in real time.
  • 7. Security Threats • There are different threats that target WSN [3] [7]. Which are categorise as follows- • Common Attacks: In WSN, wireless transmission medium is used for communication so it is easy to present many types of attacks like: Active attack (data modification, data injection, delay, DoS) and passive attack (traffic analysis, eavesdropping). • Denial of Service Attacks (DoS [4] [16]): These type of attacks prevent the normal use of communication functionality. This attack may suppress all packet directed to a particular destination e.g. jamming attack [15], Target the power of a nodes e.g. power- exhaustion, vampire attack. • Node Compromise: When a node come into network attacker extract vital information from a node like routing information, data, access control, security key etc. these attacks are These attacks are more dominant than other attacks.
  • 8. Security Threats cont’d… • Side-channel Attacks: Attacker can observe some real activity of a node like electromagnetic flow of data whenever they implement encryption or decryption. After capturing this information attacker can easily extract secret key. • Impersonation Attacks: There are two types of impersonation attack. One is Sybil attack in which adversary creates multiple fake identities and other is replication attack in which adversary create duplicates of the same identity. • Protocol-specific Attacks: In WSN some protocols are essential to perform some activity in the network. These protocols like data aggregation, routing and time synchronization are pointed by specific attacks that objective to influence the internal network services.
  • 9. Security Requirement There is need to use some security mechanism to avoid attack in WSN [5] [7]. • Confidentiality: It ensure that a given information must not be reveal by anyone other than the intended sender and receiver. • Integrity: This security service stated that the data receive by the receiver are absolute as sent by an authorize sender. • Authorization: This security service ensure that only the authorized entities (e.g.: sensor nodes and base station) can be able to execute functions in the network like data gathering, routing, processing and controlling the system. • Authentication: It allows a recipient to verify that the data is really sent by the authorised sender. In sensor network this security services is quite significant. • Auditing: Important information which is observed from environment by the sensor nodes must be stored by nodes.
  • 10. Security Requirement cont’d… • Availability: The principle of this property is that network services or resource should be always available to the authentic users when they needed. • Freshness [7]: In WSN Sensor node collect the real information from environment at every moment and transmit it to base stations. So this information must be recent. • Forward and Backward Secrecy: There are two properties needed whenever a new node join a network and a sensor node fail. First is forward secrecy where a sensor node should not be able to read any future messages after it leaves the network and the other one is backward secrecy, where a joining sensor node should not be able to read any previously transmitted message. • Privacy and Anonymity: This property ensure that the location and identities of WSN entities (sensor node and base stations) should be hidden or protected from the outsiders.
  • 11. Vampire Attack • The vampire attack is the class of Denial-of-Service attack. • Denial-of-Services in network is cause by consuming the power of the sensor node. It is also called power draining attacks because of this attack consume power of sensor nodes and disable the network. • we can categorise vampire attack into two. a) Vampire Attack on Stateless Protocol b) Vampire Attacks on Stateful Protocol
  • 12. Vampire Attack Cont’d… a) Vampire Attack on Stateless Protocol • Carousel Attack: In carousel attack, an attacker compose a packet with a path that contain series of loops of that path, so that same of nodes will traverse by the single packet many times[9] as shown in Figure. Figure 1: Carousel Attack
  • 13. Vampire Attack Cont’d… • Stretch Attack: In stretch attack, intruder build up fake long source route. So that the packets move through large number of node rather than the excellent number of nodes as shown in Figure. Figure 2: Stretch Attack
  • 14. Vampire Attack Cont’d… b) Vampire attacks on Stateful Protocol Stateful routing protocols in which network topology and its state are already known by the nodes so local forwarding decisions at each is done by using stored state. • Directional Antenna Attack: In this type of attack intruder have small control over the packet progress when forwarding decisions are made independently by each node but by using directional antenna they can still waste energy[10]. • Malicious Discovery Attacks: AODV and DSR routing algorithms are vulnerable to vampire, when route discovery initiate by the node at any time, not just during change in a topology. There are many ways for the malicious node to activate topology change: it may simply falsely claim that a link is down, or claim a new link to a non-existent node.
  • 15. Related Work 1. Eugene y. vasserman et. al. [6], Describe PLGP protocol which is developed By Parno, Luk, Gaustad and Perrig to prevent the vampire attack. PLGP have mainly two phases, first is Topology discovery Phase and other is Packet forwarding phase. 2. K. Vanitha and V.dhivya et. al. [8], They have invented a routing protocol to Prevent from Vampire Attacks in WSN, name is Valuable Secure protocol. It has mainly three phases, first is network configuration phase, second is key management and last one is communication phase. 3. B. Umakanth and J. Damodhar et. al. [13], Describe the EWMA (Energy Weighted Monitoring Algorithm) to detect the vampire attack. It has mainly two phases, first is network configuration and other is communication phase. First phase is responsible for creating an excellent routing path from source to sink. Second phase perform aggregation of the packet transmission to avoids the same packets.
  • 16. Related Work Cont’d… 4. Ashish Patil and Rahul Gaikwad et. al.[2], Describe a method to prevent vampire attack by using EWMA and finding corresponding trust value of each node. For preventing vampire attack first detect carousal and stretch attack. After detection of carousal and stretch attack reduce their impact in wireless sensor networks by using energy weight monitoring algorithm (EWMA). Then finding trust value of each node in the network for performing routing operation. 5. Amee A. Patel and Sunil J. Soni et. al [1], Describe a method for detection and prevention against vampire attack in AODV routing protocol. The main goal of approach is defending the energy draining of nodes in wireless sensor network against vampire attack and increase the life time of network. 6. Shrikant C. Chumble1 and M. M. Ghonge et. al.[12], Describe the vulnerability to the vampire attack on exiting routing protocol like AODV even they design to be secure routing. The author also proposed, vampire attack removal protocol (VARP).
  • 17. Proposed Work In this approach we add one extra field in the routing table at each node and in data packet that is Bcast_id for AODV routing protocol to detect the directional antenna attack. Step 1: Whenever sensor node want to send the information, first it will check its routing table. • If path available in routing table then goto step 3. • Otherwise it will generate the packet RREQ with Bcast_id and broadcast this packet into the network in read only mode. Step 2: The intermediate nodes either generates RREP with same Bcast_id as RREQ or rebroadcast RREQ. Redundant RREQs are dropped by these node. • If these node have a path to destination in their routing table then generates RREP and goto step 3. • Otherwise rebroadcast the RREQ packet.
  • 18. Proposed Work Cont’d… Step 3: Node will unicast a ‘route_path_alert’ packet in that forward path with fields <dest_addr, source_addr, bcast_id >. So that all intermediate nodes can update their bcast_id field in routing table corresponding to the source and destination entries. Step 4: After establish or alert the reverse and forward path, source node can transmit the information to destination. Now source node prepare data packet including Bcast_id (read only mode) and unicast this packet on particular selected path. Step 5: All Intermediate nodes match bcast_id of packet and the corresponding stored bcast_id in routing table. If bcast_id matches then this node forward the data packet otherwise send message to trusted authorise party that the particular previous node is vampire node.
  • 19. Conclusion and Future Work • Various new routing protocol against vampire attack and methods to detect or prevent the vampire in AODV routing protocol are mentioned in related work. • This paper provide a different approach for detect and prevent the vampire attack by adding one extra variable in routing table and data packet. After that performs some computation on that variable to detect and prevent this attack. • The simulation of above proposed algorithm is left for future work.
  • 20. References 1. Amee A. Patel and Sunil J. Soni, “A Novel Proposal for Defending Against Vampire Attack in WSN” International Conference on Communication Systems and Network Technologies,pp: 624-627, DOI 10.1109/CSNT in 2015. 2. Ashish Patil and Rahul Gaikwad, “Preventing Vampire Attack in Wireless Sensor Network by using Trust” International Journal of Engineering Research & Technology ISSN: 2278-0181 Vol. 4 pp: 254-258, Issue 06, June-2015. 3. C. Karlof , D. Wagner, “Secure routing in wireless sensor networks attacks And countermeasures” in proc. Of 1st IEEE Int. workshop on sensor network Protocols and applications (SNPA’03), pp. 113-127, May 2003. 4. D.R. Raymond, R.C. Marchany, M.I. Brown¯eld, and S.F. Midki, “Effects of Denial-of- Sleep Attacks on Wireless Sensor Network MAC Protocols” IEEE Trans- actions on Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009. 5. Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges” IJCIT, vol. 2, issue 1, pp. 62-67, 2011. 6. Eugene Y. Vasserman and Nicholas Hopper, “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Network” Ieee Transactions On Mobile Computing, Vol. 12, pp: 318 – 332, No. 2, February 2013. 7. J. Lopez, R. Roman, and C. Alcaraz, “Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks” Foundations of Security Analysis and Design 2009, LNCS vol. 5705, pp. 289-338, 2009. 8. K.Vanitha, and V.Dhivya, “A Valuable Secure Protocol to Prevent Vampire Attacks in Wireless Ad Hoc Sensor Networks” IEEE International Conference on Innovations in Engineering and Technology Vol. 3, pp: 2441-2446, Special Issue 3, March 2014.
  • 21. References Cont’d… 9. P.Rajipriyadharshini and V.Venkatakrishnan, S.Suganya and A .Masanam, “Vampire Attacks Deploying Resources in Wireless Sensor Networks” International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, pp: 2951-2953 ; ISSN: 0975-9646. 10. Richa kumari, Pankaj Sharma, “A Literature Survey on Detection and Prevention against Vampire Attack in WSN” international conference on computer, communication & computational sciences [IC4S 2016], pp:122-126, Ajmer (Raj.) August 2016. 11. Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari, “Security issues in wireless sensor networks” Journal of Information Systems and Communication, vol. 1, pp-01-06, issue 2, 2010. 12. Tawseef Ahmad Naqishbandi and Imthyaz Sheriff C, “A Resilient Strategy against Energy Attacks in Ad-Hoc WSN and Future IoT” International Journal of Advanced Research in Computer Science and Software Engineering Vol. 4, Issue 2, February 2014, pp: 766-773, ISSN: 2277 128X. 13. Umakant, and J. Damodhar, “Resource Consumption Attacks in Wireless Ad Hoc Sensor Networks” International Journal of Engineering Research ISSN: 2319 6890, Volume No.3 Issue No: Special 2, pp: 107-111 22 March 2014. 14. V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, and M. Welsh, “Simulating the Power Consumption of Large-Scale Sensor Network Applications” Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 188- 200, Baltimore (USA), August 2004. 15. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks” Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 46-57, Urbana-Champaign (USA), May 2005. 16. Y.W. Law, M. Palaniswami, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy, “Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols” ACM Transactions on Sensor Networks, vol. 5, no. 1, pp. 6:1-6:38, 2009.