SlideShare a Scribd company logo
VAMPIRE ATTACK IN WSN: A DETECTION
AND PREVENTION APPROACH AGAINST
VAMPIRE
Presented By:
Richa Kumari
Outline
 Introduction of WSN
Security Threats
Security Requirement
 Vampire Attack
 Related Work
 Proposed Work
 Conclusion and Future Work
 References
Introduction
a) Wireless Sensor Network
Sometimes WSN is also called WSAN, wireless sensor and actuator
networks. WSAN is a collection of autonomous sensors which are
distributed in a specific area to monitor environmental conditions,
such as pressure, temperature and sound etc. they co-ordinately
transfer their information over the network to a destination node.
Figure : Sensor Node Architecture
Introduction Cont’dâ€Ļ
b) Characteristics of WSN
â€ĸ Large no of nodes: A wireless sensor network uses huge amount
of sensor nodes.
â€ĸ Unreliable Communication: In WSN routing is done by using
connection-less protocol so obviously communication will be
unreliable.
â€ĸ Heterogeneity of nodes: The WSN have sensor nodes with
different abilities, such as various transmission or sensing ranges,
so that network provides more resilience in distribution.
â€ĸ Battery powered: The power is needed to every sensor node to
receive packet and to perform the computation on it.
â€ĸ Very limited resources: Each sensor nodes in WSN have limited
resource like memory (48K Program Memory and 1M flash
storage), 16 bit 8 MHz CPU with 10K RAM.
Introduction Cont’dâ€Ļ
â€ĸ Scalability: It is the capability of a WSN to handle a growing no.
of sensor node.
â€ĸ Node for common task: Each sensor node performs some task
like collecting the information, computation and communicating
with other nodes in the network.
â€ĸ In network data processing: This technique of WSN is very
common and also very important in which an intermediate node
has a special transmission function to aggregate the sensing data
from the source and pass the resultant data to sink node [14].
â€ĸ Self-Organization: Due to autonomous feature of the sensor
network each nodes can organize itself during ambiguous
situations [11].
Introduction Cont’dâ€Ļ
c) Application of WSN
â€ĸ Area monitoring: The WSN is deployed over an area where some
aspect is to be observed and then transmit that information to the
control unit.
â€ĸ Health monitoring: In medical science wearable and implanted
these two type of applications.
â€ĸ Air pollution monitoring: To measure the concentration of
serious gases in cities, the WSN is used to do this.
â€ĸ Forest fire detection: The Wireless Sensor Network can be
installed in a forest to detect the fire in particular coverage area. In
this process sensors measure the temperature, humidity and gases
which are produced during fire.
â€ĸ Natural disaster prevention: WSN have strongly been set up in
water sources like rivers, lacks where variation in the water levels
observed in real time.
Security Threats
â€ĸ There are different threats that target WSN [3] [7]. Which are
categorise as follows-
â€ĸ Common Attacks: In WSN, wireless transmission medium is used
for communication so it is easy to present many types of attacks
like: Active attack (data modification, data injection, delay, DoS)
and passive attack (traffic analysis, eavesdropping).
â€ĸ Denial of Service Attacks (DoS [4] [16]): These type of attacks
prevent the normal use of communication functionality. This attack
may suppress all packet directed to a particular destination e.g.
jamming attack [15], Target the power of a nodes e.g. power-
exhaustion, vampire attack.
â€ĸ Node Compromise: When a node come into network attacker
extract vital information from a node like routing information,
data, access control, security key etc. these attacks are These
attacks are more dominant than other attacks.
Security Threats cont’dâ€Ļ
â€ĸ Side-channel Attacks: Attacker can observe some real activity of
a node like electromagnetic flow of data whenever they implement
encryption or decryption. After capturing this information attacker
can easily extract secret key.
â€ĸ Impersonation Attacks: There are two types of impersonation
attack. One is Sybil attack in which adversary creates multiple fake
identities and other is replication attack in which adversary create
duplicates of the same identity.
â€ĸ Protocol-specific Attacks: In WSN some protocols are essential
to perform some activity in the network. These protocols like data
aggregation, routing and time synchronization are pointed by
specific attacks that objective to influence the internal network
services.
Security Requirement
There is need to use some security mechanism to avoid attack in
WSN [5] [7].
â€ĸ Confidentiality: It ensure that a given information must not be
reveal by anyone other than the intended sender and receiver.
â€ĸ Integrity: This security service stated that the data receive by the
receiver are absolute as sent by an authorize sender.
â€ĸ Authorization: This security service ensure that only the
authorized entities (e.g.: sensor nodes and base station) can be able
to execute functions in the network like data gathering, routing,
processing and controlling the system.
â€ĸ Authentication: It allows a recipient to verify that the data is
really sent by the authorised sender. In sensor network this security
services is quite significant.
â€ĸ Auditing: Important information which is observed from
environment by the sensor nodes must be stored by nodes.
Security Requirement cont’dâ€Ļ
â€ĸ Availability: The principle of this property is that network
services or resource should be always available to the authentic
users when they needed.
â€ĸ Freshness [7]: In WSN Sensor node collect the real information
from environment at every moment and transmit it to base stations.
So this information must be recent.
â€ĸ Forward and Backward Secrecy: There are two properties
needed whenever a new node join a network and a sensor node
fail. First is forward secrecy where a sensor node should not be
able to read any future messages after it leaves the network and the
other one is backward secrecy, where a joining sensor node should
not be able to read any previously transmitted message.
â€ĸ Privacy and Anonymity: This property ensure that the location
and identities of WSN entities (sensor node and base stations)
should be hidden or protected from the outsiders.
Vampire Attack
â€ĸ The vampire attack is the class of Denial-of-Service attack.
â€ĸ Denial-of-Services in network is cause by consuming the power of
the sensor node. It is also called power draining attacks because of
this attack consume power of sensor nodes and disable the
network.
â€ĸ we can categorise vampire attack into two.
a) Vampire Attack on Stateless Protocol
b) Vampire Attacks on Stateful Protocol
Vampire Attack Cont’dâ€Ļ
a) Vampire Attack on Stateless Protocol
â€ĸ Carousel Attack: In carousel attack, an attacker compose a packet
with a path that contain series of loops of that path, so that same of
nodes will traverse by the single packet many times[9] as shown in
Figure.
Figure 1: Carousel Attack
Vampire Attack Cont’dâ€Ļ
â€ĸ Stretch Attack: In stretch attack, intruder build up fake long
source route. So that the packets move through large number of
node rather than the excellent number of nodes as shown in Figure.
Figure 2: Stretch Attack
Vampire Attack Cont’dâ€Ļ
b) Vampire attacks on Stateful Protocol
Stateful routing protocols in which network topology and its state
are already known by the nodes so local forwarding decisions at
each is done by using stored state.
â€ĸ Directional Antenna Attack: In this type of attack intruder have
small control over the packet progress when forwarding decisions
are made independently by each node but by using directional
antenna they can still waste energy[10].
â€ĸ Malicious Discovery Attacks: AODV and DSR routing
algorithms are vulnerable to vampire, when route discovery initiate
by the node at any time, not just during change in a topology.
There are many ways for the malicious node to activate topology
change: it may simply falsely claim that a link is down, or claim a
new link to a non-existent node.
Related Work
1. Eugene y. vasserman et. al. [6], Describe PLGP protocol which is
developed By Parno, Luk, Gaustad and Perrig to prevent the
vampire attack. PLGP have mainly two phases, first is Topology
discovery Phase and other is Packet forwarding phase.
2. K. Vanitha and V.dhivya et. al. [8], They have invented a routing
protocol to Prevent from Vampire Attacks in WSN, name is
Valuable Secure protocol. It has mainly three phases, first is
network configuration phase, second is key management and last
one is communication phase.
3. B. Umakanth and J. Damodhar et. al. [13], Describe the EWMA
(Energy Weighted Monitoring Algorithm) to detect the vampire
attack. It has mainly two phases, first is network configuration and
other is communication phase. First phase is responsible for
creating an excellent routing path from source to sink. Second
phase perform aggregation of the packet transmission to avoids the
same packets.
Related Work Cont’dâ€Ļ
4. Ashish Patil and Rahul Gaikwad et. al.[2], Describe a method to
prevent vampire attack by using EWMA and finding corresponding
trust value of each node. For preventing vampire attack first detect
carousal and stretch attack. After detection of carousal and stretch
attack reduce their impact in wireless sensor networks by using
energy weight monitoring algorithm (EWMA). Then finding trust
value of each node in the network for performing routing operation.
5. Amee A. Patel and Sunil J. Soni et. al [1], Describe a method for
detection and prevention against vampire attack in AODV routing
protocol. The main goal of approach is defending the energy
draining of nodes in wireless sensor network against vampire attack
and increase the life time of network.
6. Shrikant C. Chumble1 and M. M. Ghonge et. al.[12], Describe
the vulnerability to the vampire attack on exiting routing protocol
like AODV even they design to be secure routing. The author also
proposed, vampire attack removal protocol (VARP).
Proposed Work
In this approach we add one extra field in the routing table at each
node and in data packet that is Bcast_id for AODV routing protocol
to detect the directional antenna attack.
Step 1: Whenever sensor node want to send the information, first it
will check its routing table.
â€ĸ If path available in routing table then goto step 3.
â€ĸ Otherwise it will generate the packet RREQ with Bcast_id and
broadcast this packet into the network in read only mode.
Step 2: The intermediate nodes either generates RREP with same
Bcast_id as RREQ or rebroadcast RREQ. Redundant RREQs are
dropped by these node.
â€ĸ If these node have a path to destination in their routing table then
generates RREP and goto step 3.
â€ĸ Otherwise rebroadcast the RREQ packet.
Proposed Work Cont’dâ€Ļ
Step 3: Node will unicast a ‘route_path_alert’ packet in that forward
path with fields <dest_addr, source_addr, bcast_id >.
So that all intermediate nodes can update their bcast_id field in
routing table corresponding to the source and destination entries.
Step 4: After establish or alert the reverse and forward path, source
node can transmit the information to destination.
Now source node prepare data packet including Bcast_id (read only
mode) and unicast this packet on particular selected path.
Step 5: All Intermediate nodes match bcast_id of packet and the
corresponding stored bcast_id in routing table.
If bcast_id matches then this node forward the data packet otherwise
send message to trusted authorise party that the particular previous
node is vampire node.
Conclusion and Future Work
â€ĸ Various new routing protocol against vampire attack and methods
to detect or prevent the vampire in AODV routing protocol are
mentioned in related work.
â€ĸ This paper provide a different approach for detect and prevent the
vampire attack by adding one extra variable in routing table and
data packet. After that performs some computation on that variable
to detect and prevent this attack.
â€ĸ The simulation of above proposed algorithm is left for future work.
References
1. Amee A. Patel and Sunil J. Soni, “A Novel Proposal for Defending Against Vampire
Attack in WSN” International Conference on Communication Systems and Network
Technologies,pp: 624-627, DOI 10.1109/CSNT in 2015.
2. Ashish Patil and Rahul Gaikwad, “Preventing Vampire Attack in Wireless Sensor
Network by using Trust” International Journal of Engineering Research & Technology
ISSN: 2278-0181 Vol. 4 pp: 254-258, Issue 06, June-2015.
3. C. Karlof , D. Wagner, “Secure routing in wireless sensor networks attacks And
countermeasures” in proc. Of 1st IEEE Int. workshop on sensor network Protocols and
applications (SNPA’03), pp. 113-127, May 2003.
4. D.R. Raymond, R.C. Marchany, M.I. Brown¯eld, and S.F. Midki, “Effects of Denial-of-
Sleep Attacks on Wireless Sensor Network MAC Protocols” IEEE Trans- actions on
Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009.
5. Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges”
IJCIT, vol. 2, issue 1, pp. 62-67, 2011.
6. Eugene Y. Vasserman and Nicholas Hopper, “Vampire Attacks: Draining Life from
Wireless Ad Hoc Sensor Network” Ieee Transactions On Mobile Computing, Vol. 12, pp:
318 – 332, No. 2, February 2013.
7. J. Lopez, R. Roman, and C. Alcaraz, “Analysis of Security Threats, Requirements,
Technologies and Standards in Wireless Sensor Networks” Foundations of Security
Analysis and Design 2009, LNCS vol. 5705, pp. 289-338, 2009.
8. K.Vanitha, and V.Dhivya, “A Valuable Secure Protocol to Prevent Vampire Attacks in
Wireless Ad Hoc Sensor Networks” IEEE International Conference on Innovations in
Engineering and Technology Vol. 3, pp: 2441-2446, Special Issue 3, March 2014.
References Cont’dâ€Ļ
9. P.Rajipriyadharshini and V.Venkatakrishnan, S.Suganya and A .Masanam, “Vampire Attacks
Deploying Resources in Wireless Sensor Networks” International Journal of Computer Science
and Information Technologies, Vol. 5 (3), 2014, pp: 2951-2953 ; ISSN: 0975-9646.
10. Richa kumari, Pankaj Sharma, “A Literature Survey on Detection and Prevention against
Vampire Attack in WSN” international conference on computer, communication &
computational sciences [IC4S 2016], pp:122-126, Ajmer (Raj.) August 2016.
11. Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari, “Security issues in wireless sensor networks”
Journal of Information Systems and Communication, vol. 1, pp-01-06, issue 2, 2010.
12. Tawseef Ahmad Naqishbandi and Imthyaz Sheriff C, “A Resilient Strategy against Energy
Attacks in Ad-Hoc WSN and Future IoT” International Journal of Advanced Research in
Computer Science and Software Engineering Vol. 4, Issue 2, February 2014, pp: 766-773, ISSN:
2277 128X.
13. Umakant, and J. Damodhar, “Resource Consumption Attacks in Wireless Ad Hoc Sensor
Networks” International Journal of Engineering Research ISSN: 2319 6890, Volume No.3 Issue
No: Special 2, pp: 107-111 22 March 2014.
14. V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, and M. Welsh, “Simulating the Power
Consumption of Large-Scale Sensor Network Applications” Proceedings of the 2nd
International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 188-
200, Baltimore (USA), August 2004.
15. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting
Jamming Attacks in Wireless Networks” Proceedings of the 6th ACM international symposium
on Mobile ad hoc networking and computing, pp. 46-57, Urbana-Champaign (USA), May 2005.
16. Y.W. Law, M. Palaniswami, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy,
“Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols”
ACM Transactions on Sensor Networks, vol. 5, no. 1, pp. 6:1-6:38, 2009.
Vampire attack in wsn

More Related Content

PDF
2. public key cryptography and RSA
Dr.Florence Dayana
 
PPTX
cloud computing: Vm migration
Dr.Neeraj Kumar Pandey
 
PPT
Challenge Response Authentication
AzaharulIslamAsik
 
PDF
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar
 
PPTX
Mc Culloch Pitts Neuron
Shajun Nisha
 
PPT
Security Requirements in IoT Architecture
Vrince Vimal
 
PPT
Message authentication
CAS
 
PPT
RMI
Aravind Nair
 
2. public key cryptography and RSA
Dr.Florence Dayana
 
cloud computing: Vm migration
Dr.Neeraj Kumar Pandey
 
Challenge Response Authentication
AzaharulIslamAsik
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar
 
Mc Culloch Pitts Neuron
Shajun Nisha
 
Security Requirements in IoT Architecture
Vrince Vimal
 
Message authentication
CAS
 

What's hot (20)

PDF
Iot Service Layer Evolution
oneM2M
 
PDF
Cloud Security And Privacy
tmather
 
PPTX
Image compression models
priyadharshini murugan
 
PPTX
Implementing Oracle Utilities Smart Grid Gateway: A Customer Experience
cgjohns
 
PPTX
Image Enhancement in Spatial Domain
DEEPASHRI HK
 
PPTX
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
PPTX
Fundamental steps in image processing
PremaPRC211300301103
 
PDF
Remote Method Invocation in JAVA
Jalpesh Vasa
 
PPTX
ElGamal Encryption in Go
Napier University
 
PDF
Web Security
Dr.Florence Dayana
 
PPT
Lecture 9 key distribution and user authentication
rajakhurram
 
PPT
Chapter 01
nathanurag
 
PPTX
Secure Hash Algorithm (SHA-512)
DUET
 
PDF
Cloud Computing and Service oriented Architecture
Ravindra Dastikop
 
PPT
Attacks in MANET
Sunita Sahu
 
PPT
Digital Signature Standard
Sou Jana
 
PPTX
17.INTRODUCTION TO SCHEMA REFINEMENT.pptx
AshokRachapalli1
 
PPTX
Cryptography and network security
patisa
 
DOCX
Data Visualization Andy Kirk 3.pdf.pdfData Visualisati.docx
whittemorelucilla
 
PPTX
IOT System Management with NETCONF-YANG.pptx
ArchanaPandiyan
 
Iot Service Layer Evolution
oneM2M
 
Cloud Security And Privacy
tmather
 
Image compression models
priyadharshini murugan
 
Implementing Oracle Utilities Smart Grid Gateway: A Customer Experience
cgjohns
 
Image Enhancement in Spatial Domain
DEEPASHRI HK
 
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Fundamental steps in image processing
PremaPRC211300301103
 
Remote Method Invocation in JAVA
Jalpesh Vasa
 
ElGamal Encryption in Go
Napier University
 
Web Security
Dr.Florence Dayana
 
Lecture 9 key distribution and user authentication
rajakhurram
 
Chapter 01
nathanurag
 
Secure Hash Algorithm (SHA-512)
DUET
 
Cloud Computing and Service oriented Architecture
Ravindra Dastikop
 
Attacks in MANET
Sunita Sahu
 
Digital Signature Standard
Sou Jana
 
17.INTRODUCTION TO SCHEMA REFINEMENT.pptx
AshokRachapalli1
 
Cryptography and network security
patisa
 
Data Visualization Andy Kirk 3.pdf.pdfData Visualisati.docx
whittemorelucilla
 
IOT System Management with NETCONF-YANG.pptx
ArchanaPandiyan
 
Ad

Similar to Vampire attack in wsn (20)

PDF
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
PDF
ATTACKS AND COUNTERATTACKS ON WIRELESS SENSOR NETWORKS
ijasuc
 
PDF
Attacks and counterattacks on wireless sensor networks
ijasuc
 
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
IJAEMSJORNAL
 
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
PDF
A Comparison Of Physical Attacks On Wireless Sensor Networks
Nicole Heredia
 
PDF
Denial of Service (DoS) Attacks at Network Layer in WSN
IJERA Editor
 
PDF
Sunilkumar2017
Sharonp15
 
PDF
Sunilkumar2017
Sharonp15
 
PDF
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
CSCJournals
 
PDF
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
ijp2p
 
PDF
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
ijp2p
 
PDF
Analysis of wireless sensor networks
eSAT Journals
 
PDF
Analysis of wireless sensor networks security, attacks and challenges
eSAT Publishing House
 
PDF
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
ijtsrd
 
PDF
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
ijtsrd
 
PDF
Ar34261268
IJERA Editor
 
PDF
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
PDF
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)
IRJET Journal
 
PDF
A comparative study of physical attacks on wireless sensor networks
eSAT Journals
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
ATTACKS AND COUNTERATTACKS ON WIRELESS SENSOR NETWORKS
ijasuc
 
Attacks and counterattacks on wireless sensor networks
ijasuc
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
IJAEMSJORNAL
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
A Comparison Of Physical Attacks On Wireless Sensor Networks
Nicole Heredia
 
Denial of Service (DoS) Attacks at Network Layer in WSN
IJERA Editor
 
Sunilkumar2017
Sharonp15
 
Sunilkumar2017
Sharonp15
 
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
CSCJournals
 
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
ijp2p
 
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
ijp2p
 
Analysis of wireless sensor networks
eSAT Journals
 
Analysis of wireless sensor networks security, attacks and challenges
eSAT Publishing House
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
ijtsrd
 
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
ijtsrd
 
Ar34261268
IJERA Editor
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
Survey on Issues Related to Security Attacks in Wireless Sensor Networks (WSN)
IRJET Journal
 
A comparative study of physical attacks on wireless sensor networks
eSAT Journals
 
Ad

Recently uploaded (20)

PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Information Retrieval and Extraction - Module 7
premSankar19
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 

Vampire attack in wsn

  • 1. VAMPIRE ATTACK IN WSN: A DETECTION AND PREVENTION APPROACH AGAINST VAMPIRE Presented By: Richa Kumari
  • 2. Outline  Introduction of WSN Security Threats Security Requirement  Vampire Attack  Related Work  Proposed Work  Conclusion and Future Work  References
  • 3. Introduction a) Wireless Sensor Network Sometimes WSN is also called WSAN, wireless sensor and actuator networks. WSAN is a collection of autonomous sensors which are distributed in a specific area to monitor environmental conditions, such as pressure, temperature and sound etc. they co-ordinately transfer their information over the network to a destination node. Figure : Sensor Node Architecture
  • 4. Introduction Cont’dâ€Ļ b) Characteristics of WSN â€ĸ Large no of nodes: A wireless sensor network uses huge amount of sensor nodes. â€ĸ Unreliable Communication: In WSN routing is done by using connection-less protocol so obviously communication will be unreliable. â€ĸ Heterogeneity of nodes: The WSN have sensor nodes with different abilities, such as various transmission or sensing ranges, so that network provides more resilience in distribution. â€ĸ Battery powered: The power is needed to every sensor node to receive packet and to perform the computation on it. â€ĸ Very limited resources: Each sensor nodes in WSN have limited resource like memory (48K Program Memory and 1M flash storage), 16 bit 8 MHz CPU with 10K RAM.
  • 5. Introduction Cont’dâ€Ļ â€ĸ Scalability: It is the capability of a WSN to handle a growing no. of sensor node. â€ĸ Node for common task: Each sensor node performs some task like collecting the information, computation and communicating with other nodes in the network. â€ĸ In network data processing: This technique of WSN is very common and also very important in which an intermediate node has a special transmission function to aggregate the sensing data from the source and pass the resultant data to sink node [14]. â€ĸ Self-Organization: Due to autonomous feature of the sensor network each nodes can organize itself during ambiguous situations [11].
  • 6. Introduction Cont’dâ€Ļ c) Application of WSN â€ĸ Area monitoring: The WSN is deployed over an area where some aspect is to be observed and then transmit that information to the control unit. â€ĸ Health monitoring: In medical science wearable and implanted these two type of applications. â€ĸ Air pollution monitoring: To measure the concentration of serious gases in cities, the WSN is used to do this. â€ĸ Forest fire detection: The Wireless Sensor Network can be installed in a forest to detect the fire in particular coverage area. In this process sensors measure the temperature, humidity and gases which are produced during fire. â€ĸ Natural disaster prevention: WSN have strongly been set up in water sources like rivers, lacks where variation in the water levels observed in real time.
  • 7. Security Threats â€ĸ There are different threats that target WSN [3] [7]. Which are categorise as follows- â€ĸ Common Attacks: In WSN, wireless transmission medium is used for communication so it is easy to present many types of attacks like: Active attack (data modification, data injection, delay, DoS) and passive attack (traffic analysis, eavesdropping). â€ĸ Denial of Service Attacks (DoS [4] [16]): These type of attacks prevent the normal use of communication functionality. This attack may suppress all packet directed to a particular destination e.g. jamming attack [15], Target the power of a nodes e.g. power- exhaustion, vampire attack. â€ĸ Node Compromise: When a node come into network attacker extract vital information from a node like routing information, data, access control, security key etc. these attacks are These attacks are more dominant than other attacks.
  • 8. Security Threats cont’dâ€Ļ â€ĸ Side-channel Attacks: Attacker can observe some real activity of a node like electromagnetic flow of data whenever they implement encryption or decryption. After capturing this information attacker can easily extract secret key. â€ĸ Impersonation Attacks: There are two types of impersonation attack. One is Sybil attack in which adversary creates multiple fake identities and other is replication attack in which adversary create duplicates of the same identity. â€ĸ Protocol-specific Attacks: In WSN some protocols are essential to perform some activity in the network. These protocols like data aggregation, routing and time synchronization are pointed by specific attacks that objective to influence the internal network services.
  • 9. Security Requirement There is need to use some security mechanism to avoid attack in WSN [5] [7]. â€ĸ Confidentiality: It ensure that a given information must not be reveal by anyone other than the intended sender and receiver. â€ĸ Integrity: This security service stated that the data receive by the receiver are absolute as sent by an authorize sender. â€ĸ Authorization: This security service ensure that only the authorized entities (e.g.: sensor nodes and base station) can be able to execute functions in the network like data gathering, routing, processing and controlling the system. â€ĸ Authentication: It allows a recipient to verify that the data is really sent by the authorised sender. In sensor network this security services is quite significant. â€ĸ Auditing: Important information which is observed from environment by the sensor nodes must be stored by nodes.
  • 10. Security Requirement cont’dâ€Ļ â€ĸ Availability: The principle of this property is that network services or resource should be always available to the authentic users when they needed. â€ĸ Freshness [7]: In WSN Sensor node collect the real information from environment at every moment and transmit it to base stations. So this information must be recent. â€ĸ Forward and Backward Secrecy: There are two properties needed whenever a new node join a network and a sensor node fail. First is forward secrecy where a sensor node should not be able to read any future messages after it leaves the network and the other one is backward secrecy, where a joining sensor node should not be able to read any previously transmitted message. â€ĸ Privacy and Anonymity: This property ensure that the location and identities of WSN entities (sensor node and base stations) should be hidden or protected from the outsiders.
  • 11. Vampire Attack â€ĸ The vampire attack is the class of Denial-of-Service attack. â€ĸ Denial-of-Services in network is cause by consuming the power of the sensor node. It is also called power draining attacks because of this attack consume power of sensor nodes and disable the network. â€ĸ we can categorise vampire attack into two. a) Vampire Attack on Stateless Protocol b) Vampire Attacks on Stateful Protocol
  • 12. Vampire Attack Cont’dâ€Ļ a) Vampire Attack on Stateless Protocol â€ĸ Carousel Attack: In carousel attack, an attacker compose a packet with a path that contain series of loops of that path, so that same of nodes will traverse by the single packet many times[9] as shown in Figure. Figure 1: Carousel Attack
  • 13. Vampire Attack Cont’dâ€Ļ â€ĸ Stretch Attack: In stretch attack, intruder build up fake long source route. So that the packets move through large number of node rather than the excellent number of nodes as shown in Figure. Figure 2: Stretch Attack
  • 14. Vampire Attack Cont’dâ€Ļ b) Vampire attacks on Stateful Protocol Stateful routing protocols in which network topology and its state are already known by the nodes so local forwarding decisions at each is done by using stored state. â€ĸ Directional Antenna Attack: In this type of attack intruder have small control over the packet progress when forwarding decisions are made independently by each node but by using directional antenna they can still waste energy[10]. â€ĸ Malicious Discovery Attacks: AODV and DSR routing algorithms are vulnerable to vampire, when route discovery initiate by the node at any time, not just during change in a topology. There are many ways for the malicious node to activate topology change: it may simply falsely claim that a link is down, or claim a new link to a non-existent node.
  • 15. Related Work 1. Eugene y. vasserman et. al. [6], Describe PLGP protocol which is developed By Parno, Luk, Gaustad and Perrig to prevent the vampire attack. PLGP have mainly two phases, first is Topology discovery Phase and other is Packet forwarding phase. 2. K. Vanitha and V.dhivya et. al. [8], They have invented a routing protocol to Prevent from Vampire Attacks in WSN, name is Valuable Secure protocol. It has mainly three phases, first is network configuration phase, second is key management and last one is communication phase. 3. B. Umakanth and J. Damodhar et. al. [13], Describe the EWMA (Energy Weighted Monitoring Algorithm) to detect the vampire attack. It has mainly two phases, first is network configuration and other is communication phase. First phase is responsible for creating an excellent routing path from source to sink. Second phase perform aggregation of the packet transmission to avoids the same packets.
  • 16. Related Work Cont’dâ€Ļ 4. Ashish Patil and Rahul Gaikwad et. al.[2], Describe a method to prevent vampire attack by using EWMA and finding corresponding trust value of each node. For preventing vampire attack first detect carousal and stretch attack. After detection of carousal and stretch attack reduce their impact in wireless sensor networks by using energy weight monitoring algorithm (EWMA). Then finding trust value of each node in the network for performing routing operation. 5. Amee A. Patel and Sunil J. Soni et. al [1], Describe a method for detection and prevention against vampire attack in AODV routing protocol. The main goal of approach is defending the energy draining of nodes in wireless sensor network against vampire attack and increase the life time of network. 6. Shrikant C. Chumble1 and M. M. Ghonge et. al.[12], Describe the vulnerability to the vampire attack on exiting routing protocol like AODV even they design to be secure routing. The author also proposed, vampire attack removal protocol (VARP).
  • 17. Proposed Work In this approach we add one extra field in the routing table at each node and in data packet that is Bcast_id for AODV routing protocol to detect the directional antenna attack. Step 1: Whenever sensor node want to send the information, first it will check its routing table. â€ĸ If path available in routing table then goto step 3. â€ĸ Otherwise it will generate the packet RREQ with Bcast_id and broadcast this packet into the network in read only mode. Step 2: The intermediate nodes either generates RREP with same Bcast_id as RREQ or rebroadcast RREQ. Redundant RREQs are dropped by these node. â€ĸ If these node have a path to destination in their routing table then generates RREP and goto step 3. â€ĸ Otherwise rebroadcast the RREQ packet.
  • 18. Proposed Work Cont’dâ€Ļ Step 3: Node will unicast a ‘route_path_alert’ packet in that forward path with fields <dest_addr, source_addr, bcast_id >. So that all intermediate nodes can update their bcast_id field in routing table corresponding to the source and destination entries. Step 4: After establish or alert the reverse and forward path, source node can transmit the information to destination. Now source node prepare data packet including Bcast_id (read only mode) and unicast this packet on particular selected path. Step 5: All Intermediate nodes match bcast_id of packet and the corresponding stored bcast_id in routing table. If bcast_id matches then this node forward the data packet otherwise send message to trusted authorise party that the particular previous node is vampire node.
  • 19. Conclusion and Future Work â€ĸ Various new routing protocol against vampire attack and methods to detect or prevent the vampire in AODV routing protocol are mentioned in related work. â€ĸ This paper provide a different approach for detect and prevent the vampire attack by adding one extra variable in routing table and data packet. After that performs some computation on that variable to detect and prevent this attack. â€ĸ The simulation of above proposed algorithm is left for future work.
  • 20. References 1. Amee A. Patel and Sunil J. Soni, “A Novel Proposal for Defending Against Vampire Attack in WSN” International Conference on Communication Systems and Network Technologies,pp: 624-627, DOI 10.1109/CSNT in 2015. 2. Ashish Patil and Rahul Gaikwad, “Preventing Vampire Attack in Wireless Sensor Network by using Trust” International Journal of Engineering Research & Technology ISSN: 2278-0181 Vol. 4 pp: 254-258, Issue 06, June-2015. 3. C. Karlof , D. Wagner, “Secure routing in wireless sensor networks attacks And countermeasures” in proc. Of 1st IEEE Int. workshop on sensor network Protocols and applications (SNPA’03), pp. 113-127, May 2003. 4. D.R. Raymond, R.C. Marchany, M.I. Brown¯eld, and S.F. Midki, “Effects of Denial-of- Sleep Attacks on Wireless Sensor Network MAC Protocols” IEEE Trans- actions on Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009. 5. Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges” IJCIT, vol. 2, issue 1, pp. 62-67, 2011. 6. Eugene Y. Vasserman and Nicholas Hopper, “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Network” Ieee Transactions On Mobile Computing, Vol. 12, pp: 318 – 332, No. 2, February 2013. 7. J. Lopez, R. Roman, and C. Alcaraz, “Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks” Foundations of Security Analysis and Design 2009, LNCS vol. 5705, pp. 289-338, 2009. 8. K.Vanitha, and V.Dhivya, “A Valuable Secure Protocol to Prevent Vampire Attacks in Wireless Ad Hoc Sensor Networks” IEEE International Conference on Innovations in Engineering and Technology Vol. 3, pp: 2441-2446, Special Issue 3, March 2014.
  • 21. References Cont’dâ€Ļ 9. P.Rajipriyadharshini and V.Venkatakrishnan, S.Suganya and A .Masanam, “Vampire Attacks Deploying Resources in Wireless Sensor Networks” International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, pp: 2951-2953 ; ISSN: 0975-9646. 10. Richa kumari, Pankaj Sharma, “A Literature Survey on Detection and Prevention against Vampire Attack in WSN” international conference on computer, communication & computational sciences [IC4S 2016], pp:122-126, Ajmer (Raj.) August 2016. 11. Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari, “Security issues in wireless sensor networks” Journal of Information Systems and Communication, vol. 1, pp-01-06, issue 2, 2010. 12. Tawseef Ahmad Naqishbandi and Imthyaz Sheriff C, “A Resilient Strategy against Energy Attacks in Ad-Hoc WSN and Future IoT” International Journal of Advanced Research in Computer Science and Software Engineering Vol. 4, Issue 2, February 2014, pp: 766-773, ISSN: 2277 128X. 13. Umakant, and J. Damodhar, “Resource Consumption Attacks in Wireless Ad Hoc Sensor Networks” International Journal of Engineering Research ISSN: 2319 6890, Volume No.3 Issue No: Special 2, pp: 107-111 22 March 2014. 14. V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, and M. Welsh, “Simulating the Power Consumption of Large-Scale Sensor Network Applications” Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 188- 200, Baltimore (USA), August 2004. 15. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks” Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 46-57, Urbana-Champaign (USA), May 2005. 16. Y.W. Law, M. Palaniswami, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy, “Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols” ACM Transactions on Sensor Networks, vol. 5, no. 1, pp. 6:1-6:38, 2009.