This document summarizes a paper that explores "Vampire attacks" which drain the battery power of wireless sensor networks. The paper finds that many popular routing protocols are susceptible to these attacks, which are difficult to detect and can increase overall network energy usage significantly. It proposes methods to mitigate Vampire attacks, including a new routing protocol that provably limits the damage caused during packet forwarding.
1 of 1
Download to read offline
More Related Content
Vampire attacks draining life from wireless ad hoc sensor networks
1. ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com
VAMPIRE ATTACKS DRAINING LIFE FROM WIRELESS
AD HOC SENSOR NETWORKS
ABSTRACT:
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of communication at
the routing or medium access control levels. This paper explores resource depletion attacks at the
routing protocol layer, which permanently disable networks by quickly draining nodes' battery
power. These "Vampire attacks are not specific to any specific protocol, but rather rely on the
properties of many popular classes of routing protocols.
We find that all examined protocols are susceptible to Vampire attacks, which are devastating,
difficult to detect, and are easy to carry out using as few as one malicious insider sending only
protocol-compliant messages. In the worst case, a single Vampire can increase network-wide
energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods
to mitigate these types of attacks, including a new proof-of-concept protocol that provably
bounds the damage caused by Vampires during the packet forwarding phase.