Abstract
In wireless sensor network (WSN), energy plays an important role for intermediate sensor nodes. Due to ad hoc organization of nodes in a network, security in WSN is very difficult task. There is one new type of attack called vampire attack which disables network by crushing battery life of sensor nodes in a network. It is difficult to find vampire attacks and prevent network from them. A definite requirement of energy is needed in transferring of packets from source to destination in WSN. The purpose of vampire packets is to weaken the energy of nodes slowly which leads to network failure. The life span of the nodes is increased only by detection and avoidance of vampire packets. The focus of this paper is on vampire attacks and its defenses at the routing protocol layer. The paper also gives future direction to work in the field of attack prevention.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
E.Y. Vassermann, N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013)
A. Patil, R. Gaikwad, Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor networks. Proc. Comput. Sci. 48, 387–393 (2015)
M.J. Khabbaz, C.M. Assi, W.F. Fawaz, Disruption-tolerant networking. A comprehensive survey on recent developments and persisting challenges. IEEE Commun. Surv. Tutorials 14(2), 607–640 (2012)
J.N. Al-Karaki, A.E. Kamal, Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11, 6–28 (2004)
B. Umakanth, J. Damodhar, Detection on energy draining attack using EWMA in wireless ad hoc sensor networks. Int. J. Eng. Trends Technol. 4(8), 3691–3695 (2013)
P.P. Pawar, S.N. Uke, Vampire attack detection and prevention using DLWASN on wireless adhoc sensor network. Int. J. Res. Comput. Sci. 01(03), 10–13 (2014)
K. Vanitha, V. Dhivya, A valuable secure protocol to prevent vampire attacks in wireless ad hoc sensor networks. Int. J. Innov. Res. Sci. Eng. Technol. 03(03), 2441–2446 (2014)
J. Anand, K. Sivachandar, Vampire attack detection in wireless sensor network. Int. J. Eng. Sci. Innov. Technol. 03(04), 639–644 (2014)
A. Shrivastava, R. Verma, Detection of vampire attack in wireless ad-hoc network. Int. J. Softw. Hardw. Res. Eng. 03(01), 43–48 (2015)
A. Patil, R. Gaikward, Preventing vampire attack in wireless sensor network by using trust model. Int. J. Eng. Res. Technol. 4(06), 254–258 (2015)
Soni, B. Pahadiya, Detection and removal of vampire attack in wireless sensor network. Int. J. Comput. Appl. 126(07), 46–50 (2015)
G. Lakshmi Narayana, K. Rao, A sensor network routing protocol to clear the damage from vampire attacks during packet forwarding. Int. J. Sci. Eng. Adv. Technol. 03(01), 1066–1070 (2015)
M.R. Jangre, M.R. Welekar, A survey of resource draining attacks and mitigation in wireless ad-hoc sensor networks. Int. J. Eng. Trends Technol. (IJETT) 18(7), 331–333 (2014)
P.M. Channawar, Y.V. Chavan, Vampire attack: Energy efficient trust based solution. Int. J. Sci. Res. (IJSR) 3(12), 314–317 (2014)
P. Rajipriyadharshini, V. Venkatakrishnan, S. Suganya, A. Masanam, Vampire attacks deploying resources in wireless sensor networks. (IJCSIT). Int. J. Comput. Sci. Inform. Technol. 5(3), 2951–2953 (2014)
G. Vijayanand, R. Muralidharan, Overcome vampire attacks problem in wireless ad-hoc sensor network by using distance vector protocols. Int. J. Comput. Sci. Mob. Appl. 2(1), 115–120 (2014)
B.M. Leiner, V.G. Cerf, A Brief History of the Internet (2009), http://www.isoc.org
B.B. Gupta, R.C. Joshi, M. Misra, Defending against distributed denial of service attacks: Issues and challenges. Inform. Secur. J. Glob. Persp. 18(5), 224–247 (2009)
B.B. Gupta, M. Misra, R.C. Joshi, An ISP level solution to combat DDoS attacks using combined statistical based approach. Int. J. Inform. Assur. Secur. (JIAS) 3(2), 102–110 (2008)
E. Mills, Radio Free Europe DDOS attack latest by activists, CNET News (2008), http://news.cnet.com/8301-10784_3-9933746-7.html
R. Vamosi, Study: DDoS attacks threaten ISP infrastructure, CNET News (2008), http://news.cnet.com/8301-1009_3-10093699-83.html
K. Abirami, R. Saranya, P. Jesu Jayarine, Maintaining lifetime of wireless Ad-hoc sensor networks by mitigating resource depletion attack using M-DSDV. Int. J. Res. Dev. Eng. 1(4), 112–117 (2014)
C.S. ManoreSamadhan, D. Badhan, H. Patil, Prevention of battery violation in WSN using routing loop. Int. J. Emerg. Technol. Adv. Eng. 4(2), 471–476 (2014)
Y.-C. Hu, D.B. Johnson, A. Perrig, Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proc. IEEE INFOCOM 3, 1976–1986 (2003)
Y.-C. Hu, D.B. Johnson, A. Perrig, Rushing attacks and defense in wireless Ad Hoc network routing protocols, in Proceedings of the 2nd ACM Workshop Wireless Security (WiSE), ACM, New York, 2003
A.J. Goldsmith, S.B. Wicker, Design challenges for energy- constrained ad hoc wireless networks. IEEE Wirel. Commun. 9(4), 8–27 (2012)
H. Chan, A. Perrig, Security and privacy in sensor networks. Computer 36(10), 103–105 (2010)
R.-G. Cheng, S.-M. Cheng, P. Lin, Power-efficient routing mechanism for ODMA systems. IEEE Trans. Veh. Technol. 55(4), 1311–1319 (2006)
G.A. Safdar,C. McGrath, M. McLoone, Existing Wireless Network Security Mechanisms and their Limitations for Ad Hoc Networks. Irish and simulation of dynamic and rapid auto-configuration protocols for ad-hoc wireless
L. Iannone, R. Khalili, K. Salamatian, S. Fdida, CrossLayer routing in wireless mesh networks. Proc. Int. Symp. Wirel. Commun. Syst. 2004, 319–323 (2004)
L. Xiaojun, N.B. Shroff, R. Srikant, A tutorial on cross-layer optimization in wireless networks. IEEE J. Select. Areas Comm. 24(8), 1452–1463 (2006)
X. Luo, R.K.C. Chang, On a new class of pulsing denial-of- service attacks and the defense, in Proceedings Network and Distributed System Security Symposium. (NDSS), 2005
M. Maleki, K. Dantu, M. Pedram, Power-aware source routing protocol for mobile ad hoc networks, in Proceedings International Symposium Low Power Electronics and Design (ISLPED), 2002
A´cs Gergely, Levente Buttya’n, Istva’n Vajda, Provably secure on-demand source routing in mobile Ad Hoc networks. IEEE J 5(11), 1533–1546 (2010)
J. Deng, R. Han, S. Mishra, Defending against path based DoS attacks in wireless sensor networks, in 4th IEEE International Conference, 2009
R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM. 21(2), 1–15 (2011)
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in Proceedings IEEE International Workshop Sensor Network Protocols and Applications, 2003
S. Mangai, A. Tamilarasi, C. Venkatesh: Dynamic core multicast routing protocol implementation using ANT colony optimization in ad hoc wireless networks computing. Communication Network. Inter Conference on IEEE. pp. 1–5 (2008)
Y.-C. Hu, D.B. Johnson, A. Perrig, Ariadne: A secure on- demand routing protocol for ad hoc networks. Proc. MobiCom 11, 1–2 (2002)
D.B. Johnson, D.A. Maltz, J. Broch, DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. Ad Hoc Netw., Addison-Wesley 5, 139–172 (2001)
D.R. Raymond, R.C. Marchany, M.I. Brownfield, S.F. Midkiff, Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 58(1), (2009)
I. Stojmenovic, X. Lin, Power-aware localized routing in wireless networks. IEEE Trans. Parallel Distrib. Syst. 12(11), (2011)
B. Karp, H.T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks. Proc. ACM MobiCom, 1–12 (2000)
J.-H. Chang, L. Tassiulas, Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Networking 12(4), 609–619 (2013)
E.C.-H. Ngai, M.R. Lyu, An authentication service based on trust and clustering in wireless ad hoc networks: Description and security evaluation, in IEEE International Conference on 2006
A. Kuzmanovic, E.W. Knightly, Low-rate TCPTargeted denial of service attacks: The shrew vs. the mice and elephants. Proc. SIGCOMM, 75–86 (2003)
Y.-K. Kwok, R. Tripathi, Y. Chen, K. Hwang, HAWK: Halting anomalies with weighted choking to rescue well- behaved TCP sessions from shrew DDoS attacks, in Proceedings International Conference Networking and Mobile Computing, 2005
M. Guirguis, A. Bestavros, I. Matta, Y. Zhang, Reduction of quality (RoQ) attacks on internet end-systems. Proc. IEEE INFOCOM 2, 1362–1372 (2005)
B. Karp, H.T. Kung: GPSR: Greedy Perimeter Stateless Routing for Wireless. In: Networking International Conference on Mobile Computing and network ACM-2000, Boston, Massachusetts, pp. 243–254
C.-M. Yu, Y.-T. Tsou, C.-S. Lu, S.-Y. Kuo, Constrained function-based message authentication for sensor networks. IEEE Trans. Inform. Foren. Sec. 6(2), 407–425 (2011)
Y.-C. Hu, D.B. Johnson, A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proc. IEEE Workshop Mobile Comput. Syst. Appl. 1(1), 175–192 (2002)
A.S. Nisha, V. Vaishali, T. Shivaranjani, P. Subathra, The effect of vampire attacks on distance vector routing protocols for wireless ad hoc sensor networks, in Science Technology Engineering and Management (ICONSTEM), Second International Conference on IEEE, pp. 587–594, March 2016
R. Vaidyanathan, L. Kant, A. McAuley, M. Bereschinsky, 36th Annual Performance modeling Networks Simulation Symposium, 2010
N. Goyal, T. Khurana, S. Singh, An evaluation of ad-hoc routing protocol for wireless sensor networks. Int. J. Adv. Res. Elect. Commun. Eng. 1(1), 27 (2012)
N. Goyal, A. Gaba, A review over MANET- issues and challenges. Int. J. Enhanced Res. Manag. Comput. Appl. 2(4), 16–28 (2013)
N. Goyal, A. Gaba, A new approach of location aided routing protocol using minimum bandwidth in mobile ad-hoc network. Int. J. Comput. Technol. Appl. 4(4), 653–659 (2013)
N. Goyal, H. Chawla, Vehicular ad hoc networks: A survey. Int. J. Scientific Eng. Res. 3(1), 1–7 (2015)
N. Goyal, K. Khurana, A survey on deployment strategies and energy efficiency of wireless sensor networks. Int. J. Elect. Electron. Comput. Sci. Eng. 3(3), 16–20 (2016)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Juneja, V., Gupta, D.V. (2018). Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques. In: Woungang, I., Dhurandher, S. (eds) International Conference on Wireless, Intelligent, and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 18. Springer, Cham. https://doi.org/10.1007/978-3-319-75626-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-75626-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75625-7
Online ISBN: 978-3-319-75626-4
eBook Packages: EngineeringEngineering (R0)