Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

vampire attack in ad hoc network

No description
by

shravan z

on 11 July 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of vampire attack in ad hoc network

Wireless sensors network
INTRODUCTION
WIRELESS AD-HOC NETWORKS
INTRODUCTION { CONT' }
V
ampire attack means creating and sending messages by malicious node which causes more energy consumption by the network leading to slow depletion of node’s battery life.

VAMPIRE ATTACK
VAMPIRE ATTACKS

PROVABLE SECURITY AGAINST VAMPIRE ATTACKS
Vampire Attacks: Draining Life
from wireless AD Hoc Sensor Networks
Agenda
VAMPIRE ATTACK: DRAINING
LIFE FROM AD-HOC WIRELESS
SENSORS NETWORK
PRESENTED BY
SHRAVAN ZOLGIKAR

A wireless sensor network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure
The WSN is built of nodes,where each node is connected to one (or sometimes several) sensors
IN LATIN AD-HOC MEANS " FOR THIS PURPOSE ONLY"
A wireless ad hoc network is a decentralized type of wireless network
Each node participates in routing by forwarding packets and all devices have equal status in the network
Two types:
Attack on Stateless Protocols
Attack on Stateful Protocols

STATELESS PROTOCOLS-
. Same as source routing protocol(Source node specifies entire route to destination within packet header)
. Intermediaries don’t make independent forwarding decisions
STATEFULL PROTOCOLS-
Nodes are aware of their topology, state, forwarding decisions.Nodes make local forwarding decisions on that stored state.

Two important classes are : link state and distance –vector

stateless
statefull
Carousel attack

Stretch attack

Directional antenna attack
Malicious Discovery attack
Carousel attack

Stretch attack

Topology Discovery Phase
Conclusion
Vampire attacks, a new class of resource consumption attacks that use routing protocols to permanently disable ad hoc wireless sensor networks by depleting nodes’ battery power. These attacks do not depend on particular protocols or implementations
Authors have not offered a fully satisfactory solution for Vampire attacks during the topology discovery phase, but suggested some intuition about damage limitations possible with further modifications to PLGPa.
ANY QUESTION ?
Under the Guidance of
prof. Rakesh Marturkar
INTRODUCTION

VAMPIRE ATTACK

ATTACKS ON STATELESS PROTOCOLS

ATTACKS ON STATEFUL PROTOCOLS

PROVABLE SECURITY AGAINST VAMPIRE ATTACKS

CONCLUSION
Directional Antenna Attack:

 Energy can be wasted by restarting packet in various parts of network.
 Using directional antenna adversaries can deposit packets in arbitrary parts of the network.
 Consumes energy of nodes that would not have had to process the original packet.
 Packet leashes cannot prevent this attack as they are not to protect against malicious message sources only intermediaries.

Malicious discovery attack:

>
Also known as spurious route discovery.

>
A malicious node mis-direct the packets such that two cooperating malicious
nodes may claim the link between them is down.

Clean Slate Sensor Network Routing
 Developed By Parno, Luk, Gaustad and Perrig (PLGP).

WHAT IS A VAMPIRE ?
Consist Two Phase
packet forwarding phase

Topology Discovery Phase
Each node starts as its own group size one ,with virtual address zero
Every node broadcast certificate of identity including public key
Groups merge with smallest neighbouring group By end each node knows every nodes virtual address ,public key and certificate.

packet forwarding phase

To Overcome This Problem PLGPa Method Is Proposed :

 Add a verifiable path history to every PLGP packet

 PLGPa uses this packet history together with PLGP’s tree routing structure so every node can securely verify progress, preventing any significant adversarial influence on the path taken by any packet which traverses at least one honest node.

 When any node receives a message, it checks that every node in the path attestation that
has a corresponding entry in the signature chain.

Appreciable References
[1]. Eugene Y. Vasserman and Nicholas Hopper “Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING

[2]. Securing ad hoc routing protocols,(Manel Guerrero Zapata and N. Asokan), 2002

[3]. Haowen Chan and Adrian Perrig, Security and privacy in sensor networks,Computer 36 (2003)

[4]. Denial of service attacks(Timothy J. McNevin, Jung-Min Park), 2004

[5]. Path-quality monitoring in the presence of adversaries(] Sharon Goldberg, David Xiao),2008

[6]. Packet leashes: A defence against wormhole attacks in wirelessad hoc networks, INFOCOM, 2003

THANK YOU
Full transcript