Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques

  • Vikas Juneja
  • D. V. Gupta
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 18)


In wireless sensor network (WSN), energy plays an important role for intermediate sensor nodes. Due to ad hoc organization of nodes in a network, security in WSN is very difficult task. There is one new type of attack called vampire attack which disables network by crushing battery life of sensor nodes in a network. It is difficult to find vampire attacks and prevent network from them. A definite requirement of energy is needed in transferring of packets from source to destination in WSN. The purpose of vampire packets is to weaken the energy of nodes slowly which leads to network failure. The life span of the nodes is increased only by detection and avoidance of vampire packets. The focus of this paper is on vampire attacks and its defenses at the routing protocol layer. The paper also gives future direction to work in the field of attack prevention.


WSN Security Denial of service Carousel attack Vampire attack 


  1. 1.
    E.Y. Vassermann, N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013)CrossRefGoogle Scholar
  2. 2.
    A. Patil, R. Gaikwad, Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor networks. Proc. Comput. Sci. 48, 387–393 (2015)CrossRefGoogle Scholar
  3. 3.
    M.J. Khabbaz, C.M. Assi, W.F. Fawaz, Disruption-tolerant networking. A comprehensive survey on recent developments and persisting challenges. IEEE Commun. Surv. Tutorials 14(2), 607–640 (2012)CrossRefGoogle Scholar
  4. 4.
    J.N. Al-Karaki, A.E. Kamal, Routing techniques in wireless sensor networks: a survey. IEEE Wirel. Commun. 11, 6–28 (2004)CrossRefGoogle Scholar
  5. 5.
    B. Umakanth, J. Damodhar, Detection on energy draining attack using EWMA in wireless ad hoc sensor networks. Int. J. Eng. Trends Technol. 4(8), 3691–3695 (2013)Google Scholar
  6. 6.
    P.P. Pawar, S.N. Uke, Vampire attack detection and prevention using DLWASN on wireless adhoc sensor network. Int. J. Res. Comput. Sci. 01(03), 10–13 (2014)Google Scholar
  7. 7.
    K. Vanitha, V. Dhivya, A valuable secure protocol to prevent vampire attacks in wireless ad hoc sensor networks. Int. J. Innov. Res. Sci. Eng. Technol. 03(03), 2441–2446 (2014)Google Scholar
  8. 8.
    J. Anand, K. Sivachandar, Vampire attack detection in wireless sensor network. Int. J. Eng. Sci. Innov. Technol. 03(04), 639–644 (2014)Google Scholar
  9. 9.
    A. Shrivastava, R. Verma, Detection of vampire attack in wireless ad-hoc network. Int. J. Softw. Hardw. Res. Eng. 03(01), 43–48 (2015)Google Scholar
  10. 10.
    A. Patil, R. Gaikward, Preventing vampire attack in wireless sensor network by using trust model. Int. J. Eng. Res. Technol. 4(06), 254–258 (2015)Google Scholar
  11. 11.
    Soni, B. Pahadiya, Detection and removal of vampire attack in wireless sensor network. Int. J. Comput. Appl. 126(07), 46–50 (2015)CrossRefGoogle Scholar
  12. 12.
    G. Lakshmi Narayana, K. Rao, A sensor network routing protocol to clear the damage from vampire attacks during packet forwarding. Int. J. Sci. Eng. Adv. Technol. 03(01), 1066–1070 (2015)Google Scholar
  13. 13.
    M.R. Jangre, M.R. Welekar, A survey of resource draining attacks and mitigation in wireless ad-hoc sensor networks. Int. J. Eng. Trends Technol. (IJETT) 18(7), 331–333 (2014)CrossRefGoogle Scholar
  14. 14.
    P.M. Channawar, Y.V. Chavan, Vampire attack: Energy efficient trust based solution. Int. J. Sci. Res. (IJSR) 3(12), 314–317 (2014)Google Scholar
  15. 15.
    P. Rajipriyadharshini, V. Venkatakrishnan, S. Suganya, A. Masanam, Vampire attacks deploying resources in wireless sensor networks. (IJCSIT). Int. J. Comput. Sci. Inform. Technol. 5(3), 2951–2953 (2014)Google Scholar
  16. 16.
    G. Vijayanand, R. Muralidharan, Overcome vampire attacks problem in wireless ad-hoc sensor network by using distance vector protocols. Int. J. Comput. Sci. Mob. Appl. 2(1), 115–120 (2014)Google Scholar
  17. 17.
    B.M. Leiner, V.G. Cerf, A Brief History of the Internet (2009),
  18. 18.
    B.B. Gupta, R.C. Joshi, M. Misra, Defending against distributed denial of service attacks: Issues and challenges. Inform. Secur. J. Glob. Persp. 18(5), 224–247 (2009)CrossRefGoogle Scholar
  19. 19.
    B.B. Gupta, M. Misra, R.C. Joshi, An ISP level solution to combat DDoS attacks using combined statistical based approach. Int. J. Inform. Assur. Secur. (JIAS) 3(2), 102–110 (2008)Google Scholar
  20. 20.
    E. Mills, Radio Free Europe DDOS attack latest by activists, CNET News (2008),
  21. 21.
    R. Vamosi, Study: DDoS attacks threaten ISP infrastructure, CNET News (2008),
  22. 22.
    K. Abirami, R. Saranya, P. Jesu Jayarine, Maintaining lifetime of wireless Ad-hoc sensor networks by mitigating resource depletion attack using M-DSDV. Int. J. Res. Dev. Eng. 1(4), 112–117 (2014)Google Scholar
  23. 23.
    C.S. ManoreSamadhan, D. Badhan, H. Patil, Prevention of battery violation in WSN using routing loop. Int. J. Emerg. Technol. Adv. Eng. 4(2), 471–476 (2014)Google Scholar
  24. 24.
    Y.-C. Hu, D.B. Johnson, A. Perrig, Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proc. IEEE INFOCOM 3, 1976–1986 (2003)Google Scholar
  25. 25.
    Y.-C. Hu, D.B. Johnson, A. Perrig, Rushing attacks and defense in wireless Ad Hoc network routing protocols, in Proceedings of the 2nd ACM Workshop Wireless Security (WiSE), ACM, New York, 2003Google Scholar
  26. 26.
    A.J. Goldsmith, S.B. Wicker, Design challenges for energy- constrained ad hoc wireless networks. IEEE Wirel. Commun. 9(4), 8–27 (2012)CrossRefGoogle Scholar
  27. 27.
    H. Chan, A. Perrig, Security and privacy in sensor networks. Computer 36(10), 103–105 (2010)CrossRefGoogle Scholar
  28. 28.
    R.-G. Cheng, S.-M. Cheng, P. Lin, Power-efficient routing mechanism for ODMA systems. IEEE Trans. Veh. Technol. 55(4), 1311–1319 (2006)CrossRefGoogle Scholar
  29. 29.
    G.A. Safdar,C. McGrath, M. McLoone, Existing Wireless Network Security Mechanisms and their Limitations for Ad Hoc Networks. Irish and simulation of dynamic and rapid auto-configuration protocols for ad-hoc wirelessGoogle Scholar
  30. 30.
    L. Iannone, R. Khalili, K. Salamatian, S. Fdida, CrossLayer routing in wireless mesh networks. Proc. Int. Symp. Wirel. Commun. Syst. 2004, 319–323 (2004)Google Scholar
  31. 31.
    L. Xiaojun, N.B. Shroff, R. Srikant, A tutorial on cross-layer optimization in wireless networks. IEEE J. Select. Areas Comm. 24(8), 1452–1463 (2006)CrossRefGoogle Scholar
  32. 32.
    X. Luo, R.K.C. Chang, On a new class of pulsing denial-of- service attacks and the defense, in Proceedings Network and Distributed System Security Symposium. (NDSS), 2005Google Scholar
  33. 33.
    M. Maleki, K. Dantu, M. Pedram, Power-aware source routing protocol for mobile ad hoc networks, in Proceedings International Symposium Low Power Electronics and Design (ISLPED), 2002Google Scholar
  34. 34.
    A´cs Gergely, Levente Buttya’n, Istva’n Vajda, Provably secure on-demand source routing in mobile Ad Hoc networks. IEEE J 5(11), 1533–1546 (2010)Google Scholar
  35. 35.
    J. Deng, R. Han, S. Mishra, Defending against path based DoS attacks in wireless sensor networks, in 4th IEEE International Conference, 2009Google Scholar
  36. 36.
    R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM. 21(2), 1–15 (2011)Google Scholar
  37. 37.
    C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in Proceedings IEEE International Workshop Sensor Network Protocols and Applications, 2003Google Scholar
  38. 38.
    S. Mangai, A. Tamilarasi, C. Venkatesh: Dynamic core multicast routing protocol implementation using ANT colony optimization in ad hoc wireless networks computing. Communication Network. Inter Conference on IEEE. pp. 1–5 (2008)Google Scholar
  39. 39.
    Y.-C. Hu, D.B. Johnson, A. Perrig, Ariadne: A secure on- demand routing protocol for ad hoc networks. Proc. MobiCom 11, 1–2 (2002)Google Scholar
  40. 40.
    D.B. Johnson, D.A. Maltz, J. Broch, DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. Ad Hoc Netw., Addison-Wesley 5, 139–172 (2001)Google Scholar
  41. 41.
    D.R. Raymond, R.C. Marchany, M.I. Brownfield, S.F. Midkiff, Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans. Veh. Technol. 58(1), (2009)Google Scholar
  42. 42.
    I. Stojmenovic, X. Lin, Power-aware localized routing in wireless networks. IEEE Trans. Parallel Distrib. Syst. 12(11), (2011)CrossRefGoogle Scholar
  43. 43.
    B. Karp, H.T. Kung, GPSR: Greedy perimeter stateless routing for wireless networks. Proc. ACM MobiCom, 1–12 (2000)Google Scholar
  44. 44.
    J.-H. Chang, L. Tassiulas, Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Networking 12(4), 609–619 (2013)CrossRefGoogle Scholar
  45. 45.
    E.C.-H. Ngai, M.R. Lyu, An authentication service based on trust and clustering in wireless ad hoc networks: Description and security evaluation, in IEEE International Conference on 2006Google Scholar
  46. 46.
    A. Kuzmanovic, E.W. Knightly, Low-rate TCPTargeted denial of service attacks: The shrew vs. the mice and elephants. Proc. SIGCOMM, 75–86 (2003)Google Scholar
  47. 47.
    Y.-K. Kwok, R. Tripathi, Y. Chen, K. Hwang, HAWK: Halting anomalies with weighted choking to rescue well- behaved TCP sessions from shrew DDoS attacks, in Proceedings International Conference Networking and Mobile Computing, 2005CrossRefGoogle Scholar
  48. 48.
    M. Guirguis, A. Bestavros, I. Matta, Y. Zhang, Reduction of quality (RoQ) attacks on internet end-systems. Proc. IEEE INFOCOM 2, 1362–1372 (2005)Google Scholar
  49. 49.
    B. Karp, H.T. Kung: GPSR: Greedy Perimeter Stateless Routing for Wireless. In: Networking International Conference on Mobile Computing and network ACM-2000, Boston, Massachusetts, pp. 243–254Google Scholar
  50. 50.
    C.-M. Yu, Y.-T. Tsou, C.-S. Lu, S.-Y. Kuo, Constrained function-based message authentication for sensor networks. IEEE Trans. Inform. Foren. Sec. 6(2), 407–425 (2011)CrossRefGoogle Scholar
  51. 51.
    Y.-C. Hu, D.B. Johnson, A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proc. IEEE Workshop Mobile Comput. Syst. Appl. 1(1), 175–192 (2002)Google Scholar
  52. 52.
    A.S. Nisha, V. Vaishali, T. Shivaranjani, P. Subathra, The effect of vampire attacks on distance vector routing protocols for wireless ad hoc sensor networks, in Science Technology Engineering and Management (ICONSTEM), Second International Conference on IEEE, pp. 587–594, March 2016Google Scholar
  53. 53.
    R. Vaidyanathan, L. Kant, A. McAuley, M. Bereschinsky, 36th Annual Performance modeling Networks Simulation Symposium, 2010Google Scholar
  54. 54.
    N. Goyal, T. Khurana, S. Singh, An evaluation of ad-hoc routing protocol for wireless sensor networks. Int. J. Adv. Res. Elect. Commun. Eng. 1(1), 27 (2012)Google Scholar
  55. 55.
    N. Goyal, A. Gaba, A review over MANET- issues and challenges. Int. J. Enhanced Res. Manag. Comput. Appl. 2(4), 16–28 (2013)Google Scholar
  56. 56.
    N. Goyal, A. Gaba, A new approach of location aided routing protocol using minimum bandwidth in mobile ad-hoc network. Int. J. Comput. Technol. Appl. 4(4), 653–659 (2013)Google Scholar
  57. 57.
    N. Goyal, H. Chawla, Vehicular ad hoc networks: A survey. Int. J. Scientific Eng. Res. 3(1), 1–7 (2015)Google Scholar
  58. 58.
    N. Goyal, K. Khurana, A survey on deployment strategies and energy efficiency of wireless sensor networks. Int. J. Elect. Electron. Comput. Sci. Eng. 3(3), 16–20 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Vikas Juneja
    • 1
  • D. V. Gupta
    • 2
  1. 1.JMITRadaurIndia
  2. 2.College of Engineering Roorkee (COER)RoorkeeIndia

Personalised recommendations