SlideShare a Scribd company logo
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor
Networks
ABSTRACT:
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive
computing. Prior security work in this area has focused primarily on denial of communication at
the routing or medium access control levels. This paper explores resource depletion attacks at
the routing protocol layer, which permanently disable networks by quickly draining nodes’
battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely
on the properties of many popular classes of routing protocols. We find that all examined
protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are
easy to carry out using as few as one malicious insider sending only protocol-compliant
messages. In the worst case, a single Vampire can increase network-wide energy usage by a
factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these
types of attacks, including a new proof-of-concept protocol that provably bounds the damage
caused by Vampires during the packet forwarding phase.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
EXISTING SYSTEM:
Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery
to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead
using existing valid network paths and protocol compliant messages. Protocols that maximize
power efficiency are also inappropriate, since they rely on cooperative node behavior and
cannot optimize out malicious action.
DISADVANTAGES OF EXISTING SYSTEM:
 Power outages
 Due to Environmental disasters, loss in the information
 Lost productivity
 Various DOS attacks
 Secure level is low
 They do not address attacks that affect long-term availability.
PROPOSED SYSTEM:
This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities
of existing protocols to routing layer battery depletion attacks. We observe that security
measures to prevent Vampire attacks are orthogonal to those used to protect routing
infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do
not protect against Vampire attacks. Existing work on secure routing attempts to ensure that
adversaries cannot cause path discovery to return an invalid network path, but Vampires do not
disrupt or alter discovered paths, instead using existing valid network paths and protocol-
compliant messages. Protocols that maximize power efficiency are also inappropriate, since
they rely on cooperative node behavior and cannot optimize out malicious action. Second, we
show simulation results quantifying the performance of several representative protocols in the
presence of a single Vampire (insider adversary). Third, we modify an existing sensor network
routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
In proposed system we show simulation results quantifying the performance of several
representative protocols in the presence of a single Vampire. Then, we modify an existing
sensor network routing protocol to provably bound the damage from Vampire attacks during
packet forwarding.
ADVANTAGES OF PROPOSED SYSTEM:
 Protect from the vampire attacks
 Secure level is high
 Boost up the Battery power
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from
Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING,
VOL. 12, NO. 2, FEBRUARY 2013.

More Related Content

What's hot (20)

DOCX
The three tier security scheme in wireless
IMPULSE_TECHNOLOGY
 
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
IEEEFINALYEARPROJECTS
 
PPTX
6. security in wireless sensor netwoks
Rushin Shah
 
PPTX
Vasserman-TMC13-slide
manoj kumar s
 
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
LeMeniz Infotech
 
DOCX
Hop by hop message authentication chapter 1
Selva Raj
 
PPT
security in wireless sensor networks
Vishnu Kudumula
 
PDF
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
IRJET Journal
 
PPTX
Wireless Sensor Network Security
ghaidaa WN
 
PPTX
Wireless sensor network security
argh61
 
PPTX
Wormhole attack
Harsh Kishore Mishra
 
PDF
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
ijcsa
 
PDF
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
IRJET Journal
 
PPTX
Secure and efficient data transmission for cluster based wireless sensor network
Raja Shekhar
 
DOC
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
PPTX
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
PPTX
ENSEIRB - Advanced Project
Arnaud Lempereur
 
PPT
Security and privacy in Wireless Sensor Networks
Imran Khan
 
PPTX
Trust Based Routing In wireless sensor Network
Anjan Mondal
 
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
eSAT Publishing House
 
The three tier security scheme in wireless
IMPULSE_TECHNOLOGY
 
Vampire attacks draining life from wireless ad hoc sensor networks
IEEEFINALYEARPROJECTS
 
6. security in wireless sensor netwoks
Rushin Shah
 
Vasserman-TMC13-slide
manoj kumar s
 
Secure data aggregation technique for wireless sensor networks in the presenc...
LeMeniz Infotech
 
Hop by hop message authentication chapter 1
Selva Raj
 
security in wireless sensor networks
Vishnu Kudumula
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
IRJET Journal
 
Wireless Sensor Network Security
ghaidaa WN
 
Wireless sensor network security
argh61
 
Wormhole attack
Harsh Kishore Mishra
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
ijcsa
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
IRJET Journal
 
Secure and efficient data transmission for cluster based wireless sensor network
Raja Shekhar
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
ENSEIRB - Advanced Project
Arnaud Lempereur
 
Security and privacy in Wireless Sensor Networks
Imran Khan
 
Trust Based Routing In wireless sensor Network
Anjan Mondal
 
Malicious attack detection and prevention in ad hoc network based on real tim...
eSAT Publishing House
 

Viewers also liked (9)

DOCX
A fast clustering based feature subset selection algorithm for high-dimension...
IEEEFINALYEARPROJECTS
 
DOCX
JAVA 2013 IEEE PROJECT A fast clustering based feature subset selection algor...
IEEEGLOBALSOFTTECHNOLOGIES
 
PPTX
Cse 627 final project
David Schletty
 
PPTX
IEEE Projects & Final year Projects
extremesoftsystems
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
IEEEGLOBALSOFTTECHNOLOGIES
 
PPTX
BEST PRACTICES FOR COMMUNICATING WITH KEY PROJECT STAKEHOLDERS A Case Study
Ena Arel
 
DOC
Project report on dtmf based door opening system
Mukul Mohal
 
PDF
Org change communications strategy & tips
Lsteblay
 
PDF
Student Attendance System
Minds Eye Solutions
 
A fast clustering based feature subset selection algorithm for high-dimension...
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE PROJECT A fast clustering based feature subset selection algor...
IEEEGLOBALSOFTTECHNOLOGIES
 
Cse 627 final project
David Schletty
 
IEEE Projects & Final year Projects
extremesoftsystems
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
IEEEGLOBALSOFTTECHNOLOGIES
 
BEST PRACTICES FOR COMMUNICATING WITH KEY PROJECT STAKEHOLDERS A Case Study
Ena Arel
 
Project report on dtmf based door opening system
Mukul Mohal
 
Org change communications strategy & tips
Lsteblay
 
Student Attendance System
Minds Eye Solutions
 
Ad

Similar to DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wireless ad hoc sensor networks (20)

DOCX
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
ecway
 
PDF
Java vampire attacks draining life from wireless ad hoc sensor networks
ecwayerode
 
PDF
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
IRJET Journal
 
PDF
Dotnet vampire attacks draining life from wireless ad hoc sensor networks
Ecwaytech
 
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
Ecwayt
 
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
Ecwaytech
 
PDF
A044060107
IJERA Editor
 
PDF
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
IJET - International Journal of Engineering and Techniques
 
PDF
Iaetsd identifying and preventing resource depletion attack in
Iaetsd Iaetsd
 
PDF
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
IJLT EMAS
 
PDF
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
ijtsrd
 
PPTX
Vampireattacks 131109081959-phpapp02
busireddy harish
 
PPTX
Vampire attack in wsn
Richa Kumari
 
PDF
Limiting the energy drain in wireless ad hoc sensor networks
eSAT Publishing House
 
PDF
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
PDF
Dr2645024509
IJMER
 
PDF
Kw2418391845
IJERA Editor
 
PDF
557 562
Editor IJARCET
 
DOC
Routing security in ad hoc wireless network
Elanthendral Mariappan
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
IEEEGLOBALSOFTTECHNOLOGIES
 
Vampire attacks draining life from wireless ad hoc sensor networks
ecway
 
Java vampire attacks draining life from wireless ad hoc sensor networks
ecwayerode
 
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
IRJET Journal
 
Dotnet vampire attacks draining life from wireless ad hoc sensor networks
Ecwaytech
 
Vampire attacks draining life from wireless ad hoc sensor networks
Ecwayt
 
Vampire attacks draining life from wireless ad hoc sensor networks
Ecwaytech
 
A044060107
IJERA Editor
 
[IJCT-V3I3P4] Authors: Devikarani Roy, Shilpa Verma
IJET - International Journal of Engineering and Techniques
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd Iaetsd
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
IJLT EMAS
 
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
ijtsrd
 
Vampireattacks 131109081959-phpapp02
busireddy harish
 
Vampire attack in wsn
Richa Kumari
 
Limiting the energy drain in wireless ad hoc sensor networks
eSAT Publishing House
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
Dr2645024509
IJMER
 
Kw2418391845
IJERA Editor
 
Routing security in ad hoc wireless network
Elanthendral Mariappan
 
Ad

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Facilitating document annotation usin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Error tolerant resource allocation an...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Dynamic resource allocation using vir...
IEEEGLOBALSOFTTECHNOLOGIES
 

Recently uploaded (20)

PDF
Arcee AI - building and working with small language models (06/25)
Julien SIMON
 
PDF
Productivity Management Software | Workstatus
Lovely Baghel
 
PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PDF
Upskill to Agentic Automation 2025 - Kickoff Meeting
DianaGray10
 
PDF
Trading Volume Explained by CIFDAQ- Secret Of Market Trends
CIFDAQ
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PDF
Market Wrap for 18th July 2025 by CIFDAQ
CIFDAQ
 
PDF
CIFDAQ'S Token Spotlight for 16th July 2025 - ALGORAND
CIFDAQ
 
PPTX
Simplifying End-to-End Apache CloudStack Deployment with a Web-Based Automati...
ShapeBlue
 
PPTX
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
PDF
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
PDF
OpenInfra ID 2025 - Are Containers Dying? Rethinking Isolation with MicroVMs.pdf
Muhammad Yuga Nugraha
 
PDF
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
PPTX
UI5Con 2025 - Beyond UI5 Controls with the Rise of Web Components
Wouter Lemaire
 
PDF
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
AWS Chicago
 
PPTX
Machine Learning Benefits Across Industries
SynapseIndia
 
PDF
Generative AI in Healthcare: Benefits, Use Cases & Challenges
Lily Clark
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
Arcee AI - building and working with small language models (06/25)
Julien SIMON
 
Productivity Management Software | Workstatus
Lovely Baghel
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
Upskill to Agentic Automation 2025 - Kickoff Meeting
DianaGray10
 
Trading Volume Explained by CIFDAQ- Secret Of Market Trends
CIFDAQ
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Market Wrap for 18th July 2025 by CIFDAQ
CIFDAQ
 
CIFDAQ'S Token Spotlight for 16th July 2025 - ALGORAND
CIFDAQ
 
Simplifying End-to-End Apache CloudStack Deployment with a Web-Based Automati...
ShapeBlue
 
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
OpenInfra ID 2025 - Are Containers Dying? Rethinking Isolation with MicroVMs.pdf
Muhammad Yuga Nugraha
 
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
UI5Con 2025 - Beyond UI5 Controls with the Rise of Web Components
Wouter Lemaire
 
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
AWS Chicago
 
Machine Learning Benefits Across Industries
SynapseIndia
 
Generative AI in Healthcare: Benefits, Use Cases & Challenges
Lily Clark
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wireless ad hoc sensor networks

  • 1. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks ABSTRACT: Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of O (N), where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected]
  • 2. EXISTING SYSTEM: Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. DISADVANTAGES OF EXISTING SYSTEM:  Power outages  Due to Environmental disasters, loss in the information  Lost productivity  Various DOS attacks  Secure level is low  They do not address attacks that affect long-term availability. PROPOSED SYSTEM: This paper makes three primary contributions. First, we thoroughly evaluate the vulnerabilities of existing protocols to routing layer battery depletion attacks. We observe that security measures to prevent Vampire attacks are orthogonal to those used to protect routing infrastructure, and so existing secure routing protocols such as Ariadne, SAODV and SEAD do not protect against Vampire attacks. Existing work on secure routing attempts to ensure that adversaries cannot cause path discovery to return an invalid network path, but Vampires do not disrupt or alter discovered paths, instead using existing valid network paths and protocol- compliant messages. Protocols that maximize power efficiency are also inappropriate, since they rely on cooperative node behavior and cannot optimize out malicious action. Second, we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire (insider adversary). Third, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding.
  • 3. In proposed system we show simulation results quantifying the performance of several representative protocols in the presence of a single Vampire. Then, we modify an existing sensor network routing protocol to provably bound the damage from Vampire attacks during packet forwarding. ADVANTAGES OF PROPOSED SYSTEM:  Protect from the vampire attacks  Secure level is high  Boost up the Battery power SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.  Database : MYSQL
  • 4. REFERENCE: Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013.