THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKS

被引:0
|
作者
Nisha, A. Sanofer [1 ]
Vaishali, V. [1 ]
Shivaranjani, T. [1 ]
Subathra, P. [1 ]
机构
[1] Sri Sairam Engn Coll, Dept Informat Technol, Madras, Tamil Nadu, India
关键词
Denial of service; security; routing; ad hoc networks; sensor networks; wireless networks;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The aim of this project is to define Vampire attacks, a new class of resource consumption attacks that use distance vector routing protocols to permanently disable ad hoc wireless sensor networks by depleting nodes' battery power. A node is permanently disabled once its battery power is exhausted; let us briefly consider nodes that recharge their batteries in the field, using either continuous charging or switching between active and recharge cycles. In the continuous charging case, power-draining attacks would be effective only if the adversary is able to consume power at least as fast as nodes can recharge. Assuming that packet processing drains at least as much energy from the victims as from the attacker, a continuously recharging adversary can keep at least one node permanently disabled at the cost of its own functionality. Dual-cycle networks are equally vulnerable to Vampires during active duty as long as the Vampire's cycle switching is in sync with other nodes. Vampire attacks may be weakened by using groups of nodes with staggered cycles: only active-duty nodes are vulnerable while the Vampire is active; nodes are safe while the Vampire sleeps. However, this defense is only effective when duty cycle groups outnumber Vampires, since it only takes one Vampire per group to carry out the attack.
引用
收藏
页码:587 / 594
页数:8
相关论文
共 50 条
  • [1] Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
    Vasserman, Eugene Y.
    Hopper, Nicholas
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (02) : 318 - 332
  • [2] Study of distance vector routing protocols for mobile ad hoc networks
    Lu, Y
    Wang, WC
    Zhong, YH
    Bhargava, B
    [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 187 - 194
  • [3] Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
    Zhang, Zhongwei
    Zhou, Hong
    Gao, Jason
    [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 459 - +
  • [4] Adaptive routing using emergent protocols in wireless ad hoc sensor networks
    Brooks, R
    Pirretti, M
    Zhu, MX
    Iyengar, SS
    [J]. ADVANCED SIGNAL PROCESSING ALGORITHMS, ARCHITECTURES, AND IMPLEMENTATIONS XIII, 2003, 5205 : 197 - 208
  • [5] An empirical analysis of ad hoc routing protocols for hybrid wireless sensor networks
    Saleem, M.
    Sheikh, M. A.
    [J]. 2007 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, 2007, : 198 - 203
  • [6] On the survivability of routing protocols in ad hoc wireless networks
    Awerbuch, B
    Curtmola, R
    Holmer, D
    Rubens, H
    Nita-Rotaru, C
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 327 - 338
  • [7] On security study of two distance vector routing protocols for mobile ad hoc networks
    Wang, WC
    Lu, Y
    Bhargava, B
    [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 179 - 186
  • [8] A Review of Automated Formal Verification of Ad Hoc Routing Protocols for Wireless Sensor Networks
    Chen, Zhe
    Zhang, Daqiang
    Zhu, Rongbo
    Ma, Yinxue
    Yin, Ping
    Xie, Feng
    [J]. SENSOR LETTERS, 2013, 11 (05) : 752 - 764
  • [9] On the Effect of Link Break Problem on Routing Protocols in Wireless Ad Hoc Networks
    Ho, Ying-Kwei
    Chiang, Ching-Chuan
    Liu, Ru-Sheng
    Tsai, Yao-Pin
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (03): : 383 - 391
  • [10] Provable security of on-demand distance vector routing in wireless ad hoc networks
    Acs, G
    Buttyán, L
    Vajda, I
    [J]. SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 113 - 127