Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

被引:89
作者
Vasserman, Eugene Y. [1 ]
Hopper, Nicholas [2 ]
机构
[1] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
[2] Univ Minnesota, Dept Comp Sci & Engn, Minneapolis, MN 55455 USA
关键词
Denial of service; security; routing; ad hoc networks; sensor networks; wireless networks; DENIAL-OF-SERVICE;
D O I
10.1109/TMC.2011.274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.
引用
收藏
页码:318 / 332
页数:15
相关论文
共 50 条
[41]   Integration wireless security with networking routing in ad hoc sensor networks [J].
Hu, F ;
Kumar, S ;
Sharma, NK .
5TH WORLD WIRELESS CONGRESS, PROCEEDINGS, 2004, :631-636
[42]   Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks [J].
Hortos, William S. .
EVOLUTIONARY AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS IV, 2010, 7704
[43]   Trust establishment in ad hoc and sensor networks [J].
Aivaloglou, Efthimia ;
Gritzalis, Stefanos ;
Skianis, Charalabos .
CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 :179-+
[44]   Cross-layer designs for mitigating range attacks in ad hoc networks [J].
Mölsä, JVE .
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2006, :64-69
[45]   Analysis of area-congestion-based DDoS attacks in ad hoc networks [J].
Gu, Qijun ;
Liu, Peng ;
Chu, Chao-Hsien .
AD HOC NETWORKS, 2007, 5 (05) :613-625
[46]   A trust enhanced secure clustering framework for wireless ad hoc networks [J].
Pushpita Chatterjee ;
Uttam Ghosh ;
Indranil Sengupta ;
Soumya K. Ghosh .
Wireless Networks, 2014, 20 :1669-1684
[47]   A trust enhanced secure clustering framework for wireless ad hoc networks [J].
Chatterjee, Pushpita ;
Ghosh, Uttam ;
Sengupta, Indranil ;
Ghosh, Soumya K. .
WIRELESS NETWORKS, 2014, 20 (07) :1669-1684
[48]   Energy Saving Dynamic Source Routing for ad hoc wireless networks [J].
Tarique, M ;
Tepe, KE ;
Naserian, M .
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, :305-310
[49]   Prevention of cooperative black hole attack in wireless ad hoc networks [J].
Ramaswamy, S ;
Fu, HR ;
Sreekantaradhya, M ;
Dixon, J ;
Nygard, K .
ICWN'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2003, :570-575
[50]   Wireless ad hoc networks and related topologies: applications and research challenges [J].
Toumpis, S. ;
Toumpakaris, D. .
ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (06) :232-241