Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

被引:85
|
作者
Vasserman, Eugene Y. [1 ]
Hopper, Nicholas [2 ]
机构
[1] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
[2] Univ Minnesota, Dept Comp Sci & Engn, Minneapolis, MN 55455 USA
关键词
Denial of service; security; routing; ad hoc networks; sensor networks; wireless networks; DENIAL-OF-SERVICE;
D O I
10.1109/TMC.2011.274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.
引用
收藏
页码:318 / 332
页数:15
相关论文
共 50 条
  • [1] THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKS
    Nisha, A. Sanofer
    Vaishali, V.
    Shivaranjani, T.
    Subathra, P.
    2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 587 - 594
  • [2] JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networks
    Samad, Fahad
    Abu Ahmed, Qassem
    Shaikh, Asadullah
    Aziz, Abdul
    EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 432 - +
  • [3] Transmitting to colocated users in wireless ad hoc and sensor networks
    Katz, M
    Shamai, S
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (10) : 3540 - 3563
  • [4] Coverage in wireless ad hoc sensor networks
    Li, XY
    Wan, PJ
    Frieder, O
    IEEE TRANSACTIONS ON COMPUTERS, 2003, 52 (06) : 753 - 763
  • [5] Security in wireless ad-hoc networks - A survey
    Di Pietro, R.
    Guarino, S.
    Verde, N. V.
    Domingo-Ferrer, J.
    COMPUTER COMMUNICATIONS, 2014, 51 : 1 - 20
  • [6] Simulations in wireless sensor and ad hoc networks
    EECE, University of Birmingham, United Kingdom
    不详
    Int. Conf. Mob. Comput. Netw. Co-Located Workshops Proc. First ACM Workshops Sens. Actor Netw., 2007, (1-2): : 1 - 2
  • [7] Power Draining Prevention In Ad-Hoc Sensor Networks Using Sensor Network Encryption Protocol
    Mariyappan, E.
    Balakrishnan, C.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [8] Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
    Lazos, L
    Poovendran, R
    Meadows, C
    Syverson, P
    Chang, LW
    2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1193 - 1199
  • [9] Topology control in wireless ad hoc and sensor networks
    Santi, P
    ACM COMPUTING SURVEYS, 2005, 37 (02) : 164 - 194
  • [10] Link life based routing protocol for Ad Hoc wireless networks
    Manoj, BS
    Ananthapadmanabha, R
    Murthy, CSR
    TENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2001, : 573 - 576