Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

被引:89
作者
Vasserman, Eugene Y. [1 ]
Hopper, Nicholas [2 ]
机构
[1] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
[2] Univ Minnesota, Dept Comp Sci & Engn, Minneapolis, MN 55455 USA
关键词
Denial of service; security; routing; ad hoc networks; sensor networks; wireless networks; DENIAL-OF-SERVICE;
D O I
10.1109/TMC.2011.274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.
引用
收藏
页码:318 / 332
页数:15
相关论文
共 50 条
[31]   RAS: A reliable routing protocol for wireless ad hoc and sensor networks [J].
Jawhar, Imad ;
Trabelsi, Zouheir ;
Al-Jaroodi, Jameela .
WIRELESS SENSOR AND ACTOR NETWORKS II, 2008, 264 :269-279
[32]   A Localization Based Resilience Enhancement in Ad Hoc and Wireless Sensor Networks [J].
Kumar, Amit ;
Kumar, Vijay ;
Kumar, Kamal .
SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 :452-459
[33]   Energy Constrained Positioning in Mobile Wireless Ad hoc and Sensor Networks [J].
MacLean, Stuart ;
Datta, Suprakash .
4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 :321-329
[34]   Scaling laws and operation of wireless ad-hoc and sensor networks [J].
Aeron, S ;
Venkatesh, S .
PROCEEDINGS OF THE 2003 IEEE WORKSHOP ON STATISTICAL SIGNAL PROCESSING, 2003, :367-370
[35]   Balancing security against performance in wireless ad hoc and sensor networks [J].
Chigan, CX ;
Ye, YH ;
Li, LY .
VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, :4735-4739
[36]   Placing and maintaining a core node in wireless ad hoc sensor networks [J].
Dvir, Amit ;
Segal, Michael .
NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 :13-+
[37]   Modeling of Energy Consumption for Mobile Wireless Ad Hoc and Sensor Networks [J].
Martyna, Jerzy .
COMPUTER NETWORKS, 2012, 291 :314-323
[38]   Distributed aggregation service for mobile wireless ad hoc sensor networks [J].
Department of Computer Science, National Chung-Hsing University, 250, Kuo-Kuang Road, Taichung City 40227, Taiwan ;
不详 .
Int. J. Mobile Commun., 2007, 6 (692-709) :692-709
[39]   CROSS-LAYER DESIGN IN WIRELESS AD HOC AND SENSOR NETWORKS [J].
Tepe, Kemal E. .
SIGMA JOURNAL OF ENGINEERING AND NATURAL SCIENCES-SIGMA MUHENDISLIK VE FEN BILIMLERI DERGISI, 2010, 28 (02) :66-73
[40]   Virtual Surrounding Face Geocasting in Wireless Ad Hoc and Sensor Networks [J].
Lian, Jie ;
Liu, Yunhao ;
Naik, Kshirasaoar ;
Chen, Lei .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (01) :200-211