Skip to main content

Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques

  • Conference paper
  • First Online:
International Conference on Wireless, Intelligent, and Distributed Environment for Communication (WIDECOM 2018)

Abstract

In wireless sensor network (WSN), energy plays an important role for intermediate sensor nodes. Due to ad hoc organization of nodes in a network, security in WSN is very difficult task. There is one new type of attack called vampire attack which disables network by crushing battery life of sensor nodes in a network. It is difficult to find vampire attacks and prevent network from them. A definite requirement of energy is needed in transferring of packets from source to destination in WSN. The purpose of vampire packets is to weaken the energy of nodes slowly which leads to network failure. The life span of the nodes is increased only by detection and avoidance of vampire packets. The focus of this paper is on vampire attacks and its defenses at the routing protocol layer. The paper also gives future direction to work in the field of attack prevention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E.Y. Vassermann, N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013)

    Article  Google Scholar 

  2. A. Patil, R. Gaikwad, Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor networks. Proc. Comput. Sci. 48, 387–393 (2015)

    Article  Google Scholar 

  3. M.J. Khabbaz, C.M. Assi, W.F. Fawaz, Disruption-tolerant networking. A comprehensive survey on recent developments and persisting challenges. IEEE Commun. Surv. Tutorials 14(2), 607–640 (2012)

    Article  Google Scholar 

  4. J.N. Al-Karaki, A.E. Kamal, Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11, 6–28 (2004)

    Article  Google Scholar 

  5. B. Umakanth, J. Damodhar, Detection on energy draining attack using EWMA in wireless ad hoc sensor networks. Int. J. Eng. Trends Technol. 4(8), 3691–3695 (2013)

    Google Scholar 

  6. P.P. Pawar, S.N. Uke, Vampire attack detection and prevention using DLWASN on wireless adhoc sensor network. Int. J. Res. Comput. Sci. 01(03), 10–13 (2014)

    Google Scholar 

  7. K. Vanitha, V. Dhivya, A valuable secure protocol to prevent vampire attacks in wireless ad hoc sensor networks. Int. J. Innov. Res. Sci. Eng. Technol. 03(03), 2441–2446 (2014)

    Google Scholar 

  8. J. Anand, K. Sivachandar, Vampire attack detection in wireless sensor network. Int. J. Eng. Sci. Innov. Technol. 03(04), 639–644 (2014)

    Google Scholar 

  9. A. Shrivastava, R. Verma, Detection of vampire attack in wireless ad-hoc network. Int. J. Softw. Hardw. Res. Eng. 03(01), 43–48 (2015)

    Google Scholar 

  10. A. Patil, R. Gaikward, Preventing vampire attack in wireless sensor network by using trust model. Int. J. Eng. Res. Technol. 4(06), 254–258 (2015)

    Google Scholar 

  11. Soni, B. Pahadiya, Detection and removal of vampire attack in wireless sensor network. Int. J. Comput. Appl. 126(07), 46–50 (2015)

    Article  Google Scholar 

  12. G. Lakshmi Narayana, K. Rao, A sensor network routing protocol to clear the damage from vampire attacks during packet forwarding. Int. J. Sci. Eng. Adv. Technol. 03(01), 1066–1070 (2015)

    Google Scholar 

  13. M.R. Jangre, M.R. Welekar, A survey of resource draining attacks and mitigation in wireless ad-hoc sensor networks. Int. J. Eng. Trends Technol. (IJETT) 18(7), 331–333 (2014)

    Article  Google Scholar 

  14. P.M. Channawar, Y.V. Chavan, Vampire attack: Energy efficient trust based solution. Int. J. Sci. Res. (IJSR) 3(12), 314–317 (2014)

    Google Scholar 

  15. P. Rajipriyadharshini, V. Venkatakrishnan, S. Suganya, A. Masanam, Vampire attacks deploying resources in wireless sensor networks. (IJCSIT). Int. J. Comput. Sci. Inform. Technol. 5(3), 2951–2953 (2014)

    Google Scholar 

  16. G. Vijayanand, R. Muralidharan, Overcome vampire attacks problem in wireless ad-hoc sensor network by using distance vector protocols. Int. J. Comput. Sci. Mob. Appl. 2(1), 115–120 (2014)

    Google Scholar 

  17. B.M. Leiner, V.G. Cerf, A Brief History of the Internet (2009), http://www.isoc.org

  18. B.B. Gupta, R.C. Joshi, M. Misra, Defending against distributed denial of service attacks: Issues and challenges. Inform. Secur. J. Glob. Persp. 18(5), 224–247 (2009)

    Article  Google Scholar 

  19. B.B. Gupta, M. Misra, R.C. Joshi, An ISP level solution to combat DDoS attacks using combined statistical based approach. Int. J. Inform. Assur. Secur. (JIAS) 3(2), 102–110 (2008)

    Google Scholar 

  20. E. Mills, Radio Free Europe DDOS attack latest by activists, CNET News (2008), http://news.cnet.com/8301-10784_3-9933746-7.html

  21. R. Vamosi, Study: DDoS attacks threaten ISP infrastructure, CNET News (2008), http://news.cnet.com/8301-1009_3-10093699-83.html

  22. K. Abirami, R. Saranya, P. Jesu Jayarine, Maintaining lifetime of wireless Ad-hoc sensor networks by mitigating resource depletion attack using M-DSDV. Int. J. Res. Dev. Eng. 1(4), 112–117 (2014)

    Google Scholar 

  23. C.S. ManoreSamadhan, D. Badhan, H. Patil, Prevention of battery violation in WSN using routing loop. Int. J. Emerg. Technol. Adv. Eng. 4(2), 471–476 (2014)

    Google Scholar 

  24. Y.-C. Hu, D.B. Johnson, A. Perrig, Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proc. IEEE INFOCOM 3, 1976–1986 (2003)

    Google Scholar 

  25. Y.-C. Hu, D.B. Johnson, A. Perrig, Rushing attacks and defense in wireless Ad Hoc network routing protocols, in Proceedings of the 2nd ACM Workshop Wireless Security (WiSE), ACM, New York, 2003

    Google Scholar 

  26. A.J. Goldsmith, S.B. Wicker, Design challenges for energy- constrained ad hoc wireless networks. IEEE Wirel. Commun. 9(4), 8–27 (2012)

    Article  Google Scholar 

  27. H. Chan, A. Perrig, Security and privacy in sensor networks. Computer 36(10), 103–105 (2010)

    Article  Google Scholar 

  28. R.-G. Cheng, S.-M. Cheng, P. Lin, Power-efficient routing mechanism for ODMA systems. IEEE Trans. Veh. Technol. 55(4), 1311–1319 (2006)

    Article  Google Scholar 

  29. G.A. Safdar,C. McGrath, M. McLoone, Existing Wireless Network Security Mechanisms and their Limitations for Ad Hoc Networks. Irish and simulation of dynamic and rapid auto-configuration protocols for ad-hoc wireless

    Google Scholar 

  30. L. Iannone, R. Khalili, K. Salamatian, S. Fdida, CrossLayer routing in wireless mesh networks. Proc. Int. Symp. Wirel. Commun. Syst. 2004, 319–323 (2004)

    Google Scholar 

  31. L. Xiaojun, N.B. Shroff, R. Srikant, A tutorial on cross-layer optimization in wireless networks. IEEE J. Select. Areas Comm. 24(8), 1452–1463 (2006)

    Article  Google Scholar 

  32. X. Luo, R.K.C. Chang, On a new class of pulsing denial-of- service attacks and the defense, in Proceedings Network and Distributed System Security Symposium. (NDSS), 2005

    Google Scholar 

  33. M. Maleki, K. Dantu, M. Pedram, Power-aware source routing protocol for mobile ad hoc networks, in Proceedings International Symposium Low Power Electronics and Design (ISLPED), 2002

    Google Scholar 

  34. A´cs Gergely, Levente Buttya’n, Istva’n Vajda, Provably secure on-demand source routing in mobile Ad Hoc networks. IEEE J 5(11), 1533–1546 (2010)

    Google Scholar 

  35. J. Deng, R. Han, S. Mishra, Defending against path based DoS attacks in wireless sensor networks, in 4th IEEE International Conference, 2009

    Google Scholar 

  36. R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM. 21(2), 1–15 (2011)

    Google Scholar 

  37. C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in Proceedings IEEE International Workshop Sensor Network Protocols and Applications, 2003

    Google Scholar 

  38. S. Mangai, A. Tamilarasi, C. Venkatesh: Dynamic core multicast routing protocol implementation using ANT colony optimization in ad hoc wireless networks computing. Communication Network. Inter Conference on IEEE. pp. 1–5 (2008)

    Google Scholar 

  39. Y.-C. Hu, D.B. Johnson, A. Perrig, Ariadne: A secure on- demand routing protocol for ad hoc networks. Proc. MobiCom 11, 1–2 (2002)

    Google Scholar 

  40. D.B. Johnson, D.A. Maltz, J. Broch, DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. Ad Hoc Netw., Addison-Wesley 5, 139–172 (2001)

    Google Scholar 

  41. D.R. Raymond, R.C. Marchany, M.I. Brownfield, S.F. Midkiff, Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 58(1), (2009)

    Google Scholar 

  42. I. Stojmenovic, X. Lin, Power-aware localized routing in wireless networks. IEEE Trans. Parallel Distrib. Syst. 12(11), (2011)

    Article  Google Scholar 

  43. B. Karp, H.T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks. Proc. ACM MobiCom, 1–12 (2000)

    Google Scholar 

  44. J.-H. Chang, L. Tassiulas, Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Networking 12(4), 609–619 (2013)

    Article  Google Scholar 

  45. E.C.-H. Ngai, M.R. Lyu, An authentication service based on trust and clustering in wireless ad hoc networks: Description and security evaluation, in IEEE International Conference on 2006

    Google Scholar 

  46. A. Kuzmanovic, E.W. Knightly, Low-rate TCPTargeted denial of service attacks: The shrew vs. the mice and elephants. Proc. SIGCOMM, 75–86 (2003)

    Google Scholar 

  47. Y.-K. Kwok, R. Tripathi, Y. Chen, K. Hwang, HAWK: Halting anomalies with weighted choking to rescue well- behaved TCP sessions from shrew DDoS attacks, in Proceedings International Conference Networking and Mobile Computing, 2005

    Chapter  Google Scholar 

  48. M. Guirguis, A. Bestavros, I. Matta, Y. Zhang, Reduction of quality (RoQ) attacks on internet end-systems. Proc. IEEE INFOCOM 2, 1362–1372 (2005)

    Google Scholar 

  49. B. Karp, H.T. Kung: GPSR: Greedy Perimeter Stateless Routing for Wireless. In: Networking International Conference on Mobile Computing and network ACM-2000, Boston, Massachusetts, pp. 243–254

    Google Scholar 

  50. C.-M. Yu, Y.-T. Tsou, C.-S. Lu, S.-Y. Kuo, Constrained function-based message authentication for sensor networks. IEEE Trans. Inform. Foren. Sec. 6(2), 407–425 (2011)

    Article  Google Scholar 

  51. Y.-C. Hu, D.B. Johnson, A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proc. IEEE Workshop Mobile Comput. Syst. Appl. 1(1), 175–192 (2002)

    Google Scholar 

  52. A.S. Nisha, V. Vaishali, T. Shivaranjani, P. Subathra, The effect of vampire attacks on distance vector routing protocols for wireless ad hoc sensor networks, in Science Technology Engineering and Management (ICONSTEM), Second International Conference on IEEE, pp. 587–594, March 2016

    Google Scholar 

  53. R. Vaidyanathan, L. Kant, A. McAuley, M. Bereschinsky, 36th Annual Performance modeling Networks Simulation Symposium, 2010

    Google Scholar 

  54. N. Goyal, T. Khurana, S. Singh, An evaluation of ad-hoc routing protocol for wireless sensor networks. Int. J. Adv. Res. Elect. Commun. Eng. 1(1), 27 (2012)

    Google Scholar 

  55. N. Goyal, A. Gaba, A review over MANET- issues and challenges. Int. J. Enhanced Res. Manag. Comput. Appl. 2(4), 16–28 (2013)

    Google Scholar 

  56. N. Goyal, A. Gaba, A new approach of location aided routing protocol using minimum bandwidth in mobile ad-hoc network. Int. J. Comput. Technol. Appl. 4(4), 653–659 (2013)

    Google Scholar 

  57. N. Goyal, H. Chawla, Vehicular ad hoc networks: A survey. Int. J. Scientific Eng. Res. 3(1), 1–7 (2015)

    Google Scholar 

  58. N. Goyal, K. Khurana, A survey on deployment strategies and energy efficiency of wireless sensor networks. Int. J. Elect. Electron. Comput. Sci. Eng. 3(3), 16–20 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Juneja, V., Gupta, D.V. (2018). Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques. In: Woungang, I., Dhurandher, S. (eds) International Conference on Wireless, Intelligent, and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 18. Springer, Cham. https://doi.org/10.1007/978-3-319-75626-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75626-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75625-7

  • Online ISBN: 978-3-319-75626-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics