SlideShare a Scribd company logo
1 of 27
Introduction
Ad hoc Wireless Sensor Network :
 decentralized type of wireless network
 Ad hoc : It does not rely on pre existing infrastructure such as routers in
wired networks and access points in managed wireless networks.
 Each node participates in routing by forwarding packets.
 all devices have equal status in the network
Applications:
 Ubiquitous on demand computing power
 Continuous connectivity
 Instantly deployable communication for military and first responders
 Monitor environmental conditions , factory performance and troop
deployment.
Vampire attack:
Definition: : Vampire attack means creating and sending messages by
malicious node which causes more energy consumption by the
network leading to slow depletion of node’s battery life.

Features:
 Vampire attacks are not protocol specific
 They don’t disrupt immediate availability
 Vampires use protocol compliant messages
 Transmit little data with largest energy drain
 Vampires do not disrupt or alter discovered paths
Areas of Seminar & Technology
 Area related to seminar: PROTECTION FROM VAMPIRE ATTACK ON

ROUTING PROTOCOL
 Areas of seminar includes:






Evaluates vulnerabilities of existing protocols to battery depletion
attacks
Show Simulation results quantifying the performance of several
protocols in the presence of a single Vampire
Modification of an existing sensor network routing protocol to bound
the damage from Vampire attacks
Literature Survey
ATTACK

FEATURES

DISADVANTAGES
OF DEFENSES

REFERENCES

Sleep
Deprivation
Torture

Prevents nodes
It considers attacks
from entering sleep only at the Medium
cycle and depletes
Access Control(MAC)
batteries faster

David R
Raymond and
Randy C
Marchany ,2009

Resource
Exhaustion

Mentions resource
exhaustion at MAC
and transport
layers

Only offers rate
limiting and
elimination of insider
adversaries

Anthony D
Wood and John
A.Stankovic,2002

Flood Attack

Multiple request
connections to
server ,run out of
resources

Punishes nodes that
produce bursty traffic
but may not send
much data

Daniel J.
Bernstein,1996
ATTACKS

FEATURES

DISADVANTAGES

REFERENCES

Reduction of
Quality
Attacks

Produce long term
degradation in
networks

Focus is only on
transport layer and not
on routing protocols.

Sharon Goldberg
and David
Xiao,2008

DoS Attacks

Malefactor
overwhelms honest
nodes with large
amounts of data

Applicable only to
traditional DoS,
Doesn’t work with
intelligent adversaries
i.e. protocol compliant

Jing Deng and
Richard
Han,2005

Wormhole
attack &
Directional
Antenna
attack

Allows connection
b/w two non
neighbouring
malicious nodes :
disrupt route
discovery

Packet Leashes:
Solution comes at high
cost and is not always
applicable

INFOCOM,2003
TECHNOLOGY

Minimal Energy
Routing

FEATURES

Increase the
lifetime of power
constrained
networks using less
energy to transmit
and receive packets

DISADVANTAGES

REFERENCES

Vampire attacks
Jae-Hwan Chang
increase energy usage and Leandros
even in minimal
Tassiulas,2004
energy routing
Vampire attack
Definition: Vampire attack [1] means creating and sending messages by
malicious node which causes more energy consumption by the
network leading to slow depletion of node’s battery life.
 Two types:
 Attack on Stateless Protocols
 Attack on Stateful Protocols
 Stateless Protocols:
 Same as source routing protocol
 Source node specifies entire route to destination within packet header.
 Intermediaries don’t make independent forwarding decisions.
 Stateful Protocols:
 Nodes are aware of their topology, state, forwarding decisions.
 Nodes make local forwarding decisions on that stored state.
 Two important classes are : link state and distance –vector
Attacks on Stateless Protocols
 Types of attacks :
 Carousel attack
 Stretch attack

 Carousel Attack:
 Adversary sends packets with

routes composed of a series of
loops.
 Exploits limited verification of
message headers at forwarding
nodes
 Used to increase the route
length beyond no of nodes in
network
 Theoretical limit: energy usage
increase by a factor of O(λ),
where λ is the maximum route
length.
•Stretch Attack
 adversary constructs artificially
long routes traversing every node
in the network.
Causes packets to traverse larger
than optimal no of nodes
Causes nodes that doesn’t lie on
optimal path to process packets
 Theoretical limit: energy usage
increase of factor
O(min(N, λ)), where N is the
number of nodes
in the network and λ is the
maximum path length allowed.
Potentially less damaging per
packet than the carousel attack, as
the no of hops per packet is
bounded by the number of
Attack on Stateful Protocols
Types of attacks:
 Directional antenna attack
 Malicious Discovery attack

Directional Antenna attack:
Energy can be wasted by restarting packet in various parts of network
Using a directional antenna adversaries can deposit packets in arbitrary parts of
the network.
Consumes energy of nodes that would not have had to process the original
packet.
Half Wormhole attack – as a directional antenna constitutes a private
communication channel.
Packet leashes cannot prevent this attack as they are not to protect against
malicious message sources only intermediaries.
Malicious Discovery Attack:
Also known as Spurious route discovery.
Falsely claims that a link is down or claim a new link to non existent
node
More serious when nodes claim a long distance route has changed.
Trivial in open networks
In closed networks : repeatedly announce and withdraw routes
Theoretical energy usage increase of a factor of O(N) per packet.
Packet leashes cannot prevent: originators are malicious
Existing System & Disadvantages
Clean Slate Sensor Network Routing
 Developed By Parno,Luk, Gaustad and Perrig (PLGP).
Original version is vulnerable to vampire attacks
 Can be Modified to resist vampire attacks
Two phases:
 Topology Discovery Phase
Packet Forwarding phase

Discovery organizes nodes to trees
Initially : each node knows only itself
At end of discovery each node should compute the same
address tree as other nodes.
All leaf nodes are physical nodes in network and virtual
addresses corresponds to their position in the network.
Clean Slate Sensor Network Routing (Contd..)
Topology Discovery Phase:
Every node broadcast certificate
of identity including public key.
Each node starts as its own
group size one ,with virtual
address zero
Groups merge with smallest
neighbouring group
Each group chooses 0 or 1 when
merge with another group.
Each member prepends group
address to their own address
Gateway nodes
By end each node knows every
nodes virtual address ,public key
and certificate.
Network converges to a single
group
Packet forwarding phase:
All decisions are made
independently by each node
A node when receives a packet
determines next hop by finding the
most significant bit of its address
that differs from the message
originators address.
Every forwarding event shortens
the logical distance to destination
PLGP in presence of vampires:
 forwarding nodes don’t know the path of a packet and allowing adversaries to
divert packet to any part of the network.
Honest node may be farther away from the destination than malicious nodes.
But honest node knows only its address and destination address.
Vampire moves packet away from the destination
Theoretical energy increase of O(d) where d is the network diameter and N the
number of network nodes.
Worse if packet returns to vampire as it can reroute
Provable Security against vampire
attacks
•No-backtracking property:
Satisfied for a given packet if and only if it consistently makes progress
toward its destination in the logical network address space.
More formally:
No-backtracking is satisfied if every packet p traverses the same number of
hops whether or not an adversary is present in the network.
Case 1: L is honest

L

…(hops) …

D

Case 2: L is Malicious

L

…(hops) …

D

•Same no of Hops
•Same network wide energy utilization
•is independent of the actions of malicious nodes
Nodes keep track of route cost
No-backtracking implies Vampire resistance
Provable Security against vampire
attacks (contd..)
PLGP does not satisfy No-backtracking property:
In PLGP packets are forwarded along the shortest route through the tree
that is allowed by the physical topology.
Since the tree implicitly mirrors the topology and since every node holds
an identical copy of the address tree, every node can verify the optimal next
logical hop.
However, this is not sufficient for no-backtracking to hold, since nodes cannot be
certain of the path previously traversed by a packet.
Adversaries can always lie about their local metric cost
 PLGP is still vulnerable
Proposed System:
Propose PLGP with attestations (PLGPa):
 Add a verifiable path history to every PLGP packet
 PLGPa uses this packet history together with PLGP’s tree routing
structure so every node can securely verify progress, preventing any
significant adversarial influence on the path taken by any packet which
traverses at least one honest node.
These signatures form a chain attached to every packet, allowing any node
receiving it to validate its path. Every forwarding node verifies the
attestation chain to ensure that the packet has never traveled away from its
destination in the logical address space.

packet forwarding for PLGPa
PLGPa satisfies no-backtracking
•All messages are signed by their originator .
•adversary can only alter packet fields that are changed en route, so only the route
attestation field can be altered, shortened, or removed entirely.
•To prevent truncation, use one-way signature chain construction
•The hop count of a packet is defined as follows:
Definition. The hop count of packet p, received or forwarded by an honest node, is no
greater than the number of entries in p’s route attestation field, plus 1.
•When any node receives a message, it checks that every node in the path attestation 1) has
a corresponding entry in the signature chain, and 2) is logically closer to the destination
than the previous hop in the chain. This way, forwarding nodes can enforce the forward
progress of a message, preserving no-backtracking.
Theorem 1. A PLGPa packet p satisfies no-backtracking in the presence of an adversary
controlling m < N - 3 nodes if p passes through at least one honest node.
Proof:

…Since each possible adversarial action
which results in backtracking violates
an assumption , The proof is complete
Comparison of Existing Vs Proposed System
PLGP

PLGPa

PLGP does not have attestation

It is PLGP with attestation

Forwarding nodes doesn’t know the
path of the packet

Each packet has a verifiable path history

Does not hold Backtracking

Holds Backtracking

Vulnerable to Vampire attacks

Resistant to vampire attacks
Advantages of Proposed System
 PLGPa never floods
 Packet forwarding overhead is favourable
 Demonstrates more equitable routing load

distribution and path diversity
 Even without dedicated hardware, the cryptographic
computation required for PLGPa is tractable even on
8-bit processors.
Future Scope
 Ad hoc wireless sensor networks promise exciting new

applications in the near future.
 As WSN’s become more and more crucial to everyday
life availability faults become less tolerable
 Thus high availability of these nodes is critical and
must hold even under malicious conditions.
References
[1] Frank Stajano and Ross Anderson, The resurrecting duckling: security
issues for ad-hoc wireless networks, International workshop on security
protocols, 1999.
[2] Haowen Chan and Adrian Perrig, Security and privacy in sensor
networks,
Computer 36 (2003)
[3] Denial of service attacks(Timothy J. McNevin, Jung-Min Park), 2004

[4] Path-quality monitoring in the presence of adversaries(] Sharon
Goldberg, David Xiao),2008.
[5] Packet leashes: A defence against wormhole attacks in wireless
ad hoc networks, INFOCOM, 2003.

[6] Securing ad hoc routing protocols,(Manel Guerrero Zapata and N.
Asokan), 2002
Thank you!!!
QUESTIONS

More Related Content

What's hot

Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...IEEEGLOBALSOFTTECHNOLOGIES
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 

What's hot (17)

Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 

Similar to Wireless Sensor Network Protection from Vampire Attacks

Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02busireddy harish
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networksProf. Dr. Noman Islam
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Baddam Akhil Reddy
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSIRJET Journal
 

Similar to Wireless Sensor Network Protection from Vampire Attacks (20)

Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

Wireless Sensor Network Protection from Vampire Attacks

  • 1.
  • 2. Introduction Ad hoc Wireless Sensor Network :  decentralized type of wireless network  Ad hoc : It does not rely on pre existing infrastructure such as routers in wired networks and access points in managed wireless networks.  Each node participates in routing by forwarding packets.  all devices have equal status in the network Applications:  Ubiquitous on demand computing power  Continuous connectivity  Instantly deployable communication for military and first responders  Monitor environmental conditions , factory performance and troop deployment.
  • 3. Vampire attack: Definition: : Vampire attack means creating and sending messages by malicious node which causes more energy consumption by the network leading to slow depletion of node’s battery life. Features:  Vampire attacks are not protocol specific  They don’t disrupt immediate availability  Vampires use protocol compliant messages  Transmit little data with largest energy drain  Vampires do not disrupt or alter discovered paths
  • 4. Areas of Seminar & Technology  Area related to seminar: PROTECTION FROM VAMPIRE ATTACK ON ROUTING PROTOCOL  Areas of seminar includes:    Evaluates vulnerabilities of existing protocols to battery depletion attacks Show Simulation results quantifying the performance of several protocols in the presence of a single Vampire Modification of an existing sensor network routing protocol to bound the damage from Vampire attacks
  • 5. Literature Survey ATTACK FEATURES DISADVANTAGES OF DEFENSES REFERENCES Sleep Deprivation Torture Prevents nodes It considers attacks from entering sleep only at the Medium cycle and depletes Access Control(MAC) batteries faster David R Raymond and Randy C Marchany ,2009 Resource Exhaustion Mentions resource exhaustion at MAC and transport layers Only offers rate limiting and elimination of insider adversaries Anthony D Wood and John A.Stankovic,2002 Flood Attack Multiple request connections to server ,run out of resources Punishes nodes that produce bursty traffic but may not send much data Daniel J. Bernstein,1996
  • 6. ATTACKS FEATURES DISADVANTAGES REFERENCES Reduction of Quality Attacks Produce long term degradation in networks Focus is only on transport layer and not on routing protocols. Sharon Goldberg and David Xiao,2008 DoS Attacks Malefactor overwhelms honest nodes with large amounts of data Applicable only to traditional DoS, Doesn’t work with intelligent adversaries i.e. protocol compliant Jing Deng and Richard Han,2005 Wormhole attack & Directional Antenna attack Allows connection b/w two non neighbouring malicious nodes : disrupt route discovery Packet Leashes: Solution comes at high cost and is not always applicable INFOCOM,2003
  • 7. TECHNOLOGY Minimal Energy Routing FEATURES Increase the lifetime of power constrained networks using less energy to transmit and receive packets DISADVANTAGES REFERENCES Vampire attacks Jae-Hwan Chang increase energy usage and Leandros even in minimal Tassiulas,2004 energy routing
  • 8. Vampire attack Definition: Vampire attack [1] means creating and sending messages by malicious node which causes more energy consumption by the network leading to slow depletion of node’s battery life.  Two types:  Attack on Stateless Protocols  Attack on Stateful Protocols  Stateless Protocols:  Same as source routing protocol  Source node specifies entire route to destination within packet header.  Intermediaries don’t make independent forwarding decisions.  Stateful Protocols:  Nodes are aware of their topology, state, forwarding decisions.  Nodes make local forwarding decisions on that stored state.  Two important classes are : link state and distance –vector
  • 9. Attacks on Stateless Protocols  Types of attacks :  Carousel attack  Stretch attack  Carousel Attack:  Adversary sends packets with routes composed of a series of loops.  Exploits limited verification of message headers at forwarding nodes  Used to increase the route length beyond no of nodes in network  Theoretical limit: energy usage increase by a factor of O(λ), where λ is the maximum route length.
  • 10. •Stretch Attack  adversary constructs artificially long routes traversing every node in the network. Causes packets to traverse larger than optimal no of nodes Causes nodes that doesn’t lie on optimal path to process packets  Theoretical limit: energy usage increase of factor O(min(N, λ)), where N is the number of nodes in the network and λ is the maximum path length allowed. Potentially less damaging per packet than the carousel attack, as the no of hops per packet is bounded by the number of
  • 11. Attack on Stateful Protocols Types of attacks:  Directional antenna attack  Malicious Discovery attack Directional Antenna attack: Energy can be wasted by restarting packet in various parts of network Using a directional antenna adversaries can deposit packets in arbitrary parts of the network. Consumes energy of nodes that would not have had to process the original packet. Half Wormhole attack – as a directional antenna constitutes a private communication channel. Packet leashes cannot prevent this attack as they are not to protect against malicious message sources only intermediaries.
  • 12. Malicious Discovery Attack: Also known as Spurious route discovery. Falsely claims that a link is down or claim a new link to non existent node More serious when nodes claim a long distance route has changed. Trivial in open networks In closed networks : repeatedly announce and withdraw routes Theoretical energy usage increase of a factor of O(N) per packet. Packet leashes cannot prevent: originators are malicious
  • 13. Existing System & Disadvantages Clean Slate Sensor Network Routing  Developed By Parno,Luk, Gaustad and Perrig (PLGP). Original version is vulnerable to vampire attacks  Can be Modified to resist vampire attacks Two phases:  Topology Discovery Phase Packet Forwarding phase Discovery organizes nodes to trees Initially : each node knows only itself At end of discovery each node should compute the same address tree as other nodes. All leaf nodes are physical nodes in network and virtual addresses corresponds to their position in the network.
  • 14. Clean Slate Sensor Network Routing (Contd..) Topology Discovery Phase: Every node broadcast certificate of identity including public key. Each node starts as its own group size one ,with virtual address zero Groups merge with smallest neighbouring group Each group chooses 0 or 1 when merge with another group. Each member prepends group address to their own address Gateway nodes By end each node knows every nodes virtual address ,public key and certificate. Network converges to a single group
  • 15. Packet forwarding phase: All decisions are made independently by each node A node when receives a packet determines next hop by finding the most significant bit of its address that differs from the message originators address. Every forwarding event shortens the logical distance to destination
  • 16. PLGP in presence of vampires:  forwarding nodes don’t know the path of a packet and allowing adversaries to divert packet to any part of the network. Honest node may be farther away from the destination than malicious nodes. But honest node knows only its address and destination address. Vampire moves packet away from the destination Theoretical energy increase of O(d) where d is the network diameter and N the number of network nodes. Worse if packet returns to vampire as it can reroute
  • 17. Provable Security against vampire attacks •No-backtracking property: Satisfied for a given packet if and only if it consistently makes progress toward its destination in the logical network address space. More formally: No-backtracking is satisfied if every packet p traverses the same number of hops whether or not an adversary is present in the network. Case 1: L is honest L …(hops) … D Case 2: L is Malicious L …(hops) … D •Same no of Hops •Same network wide energy utilization •is independent of the actions of malicious nodes Nodes keep track of route cost No-backtracking implies Vampire resistance
  • 18. Provable Security against vampire attacks (contd..) PLGP does not satisfy No-backtracking property: In PLGP packets are forwarded along the shortest route through the tree that is allowed by the physical topology. Since the tree implicitly mirrors the topology and since every node holds an identical copy of the address tree, every node can verify the optimal next logical hop. However, this is not sufficient for no-backtracking to hold, since nodes cannot be certain of the path previously traversed by a packet. Adversaries can always lie about their local metric cost  PLGP is still vulnerable
  • 19. Proposed System: Propose PLGP with attestations (PLGPa):  Add a verifiable path history to every PLGP packet  PLGPa uses this packet history together with PLGP’s tree routing structure so every node can securely verify progress, preventing any significant adversarial influence on the path taken by any packet which traverses at least one honest node. These signatures form a chain attached to every packet, allowing any node receiving it to validate its path. Every forwarding node verifies the attestation chain to ensure that the packet has never traveled away from its destination in the logical address space. packet forwarding for PLGPa
  • 20. PLGPa satisfies no-backtracking •All messages are signed by their originator . •adversary can only alter packet fields that are changed en route, so only the route attestation field can be altered, shortened, or removed entirely. •To prevent truncation, use one-way signature chain construction •The hop count of a packet is defined as follows: Definition. The hop count of packet p, received or forwarded by an honest node, is no greater than the number of entries in p’s route attestation field, plus 1. •When any node receives a message, it checks that every node in the path attestation 1) has a corresponding entry in the signature chain, and 2) is logically closer to the destination than the previous hop in the chain. This way, forwarding nodes can enforce the forward progress of a message, preserving no-backtracking. Theorem 1. A PLGPa packet p satisfies no-backtracking in the presence of an adversary controlling m < N - 3 nodes if p passes through at least one honest node.
  • 21. Proof: …Since each possible adversarial action which results in backtracking violates an assumption , The proof is complete
  • 22. Comparison of Existing Vs Proposed System PLGP PLGPa PLGP does not have attestation It is PLGP with attestation Forwarding nodes doesn’t know the path of the packet Each packet has a verifiable path history Does not hold Backtracking Holds Backtracking Vulnerable to Vampire attacks Resistant to vampire attacks
  • 23. Advantages of Proposed System  PLGPa never floods  Packet forwarding overhead is favourable  Demonstrates more equitable routing load distribution and path diversity  Even without dedicated hardware, the cryptographic computation required for PLGPa is tractable even on 8-bit processors.
  • 24. Future Scope  Ad hoc wireless sensor networks promise exciting new applications in the near future.  As WSN’s become more and more crucial to everyday life availability faults become less tolerable  Thus high availability of these nodes is critical and must hold even under malicious conditions.
  • 25. References [1] Frank Stajano and Ross Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, International workshop on security protocols, 1999. [2] Haowen Chan and Adrian Perrig, Security and privacy in sensor networks, Computer 36 (2003) [3] Denial of service attacks(Timothy J. McNevin, Jung-Min Park), 2004 [4] Path-quality monitoring in the presence of adversaries(] Sharon Goldberg, David Xiao),2008. [5] Packet leashes: A defence against wormhole attacks in wireless ad hoc networks, INFOCOM, 2003. [6] Securing ad hoc routing protocols,(Manel Guerrero Zapata and N. Asokan), 2002