2013
DOI: 10.1109/tmc.2011.274
|View full text |Cite
|
Sign up to set email alerts
|

Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

Abstract: Abstract-Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific protocol, but rather rely on the properties of many popula… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
81
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 128 publications
(82 citation statements)
references
References 79 publications
0
81
0
Order By: Relevance
“…Baig, Zubair A 2011 [19] was introduced a new method to protect the network. As the attacks are distributed so to detect these attacks we use pattern recognition methods in a more precise manner.…”
Section: Kumar P Arun Raj2013mentioning
confidence: 99%
“…Baig, Zubair A 2011 [19] was introduced a new method to protect the network. As the attacks are distributed so to detect these attacks we use pattern recognition methods in a more precise manner.…”
Section: Kumar P Arun Raj2013mentioning
confidence: 99%
“…Vampire attacks can be regarded as a variant of resource consumption attacks [21] [22]. By substantially increasing the packet transmission frequency between wireless sensor nodes, the adversary consumes the computing resources and battery power of the nodes.…”
Section: Vampire Attacksmentioning
confidence: 99%
“…Selfish nodes intentionally drop all the packets that are not destined for it to save the transmission power [17]. Thus, selfish nodes decrease the network performance.…”
Section: B Attacks On Routing Protocols and Its Solutionsmentioning
confidence: 99%