Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Vampire attacks seminar report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Vampire attacks

[attachment=68119]

INTRODUCTION

Wireless ad-hoc sensor networks will provide one of the missing connections between the Internet and the physical world. An ad hoc network is a wireless decentralized structure network comprised of nodes, which autonomously set up a network. A sensor is a device that produces a measurable response to a change in a physical condition, such as temperature or magnetic field.



1.1 Attacks on stateless protocols


The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. In this system, the source node specifies the entire route to a destination within the packet header, so intermediaries do not make independent forwarding decisions, relying rather on a route specified by the source. To forward a message, the intermediate node finds itself in the route and transmits the message to the next hop. The following two attacks have been occurred



1.2 Attacks on Stateful Protocols


In this the network nodes are aware of the network topology and its state, and make local forwarding decisions based on that stored state. Two important classes of stateful protocols are link-state and distance-vector. In link-state protocols, nodes keep a record of the up-or-down state of links in the network, and flood routing updates every time a link goes down or a new link is enabled. Distance-vector protocols like keep track of the next hop to every destination, indexed by a route cost metric.



1.2.1 Directional antenna attack


Vampires have little control over packet progress when forwarding decisions are made independently by each node, but they can still waste energy by restarting a packet in various parts of the network. Using directional antenna adversaries can deposit a packet in
arbitrary parts of the network, while also forwarding the packet locally. This consumes the energy of nodes that would not have had to process the original packet, with the expected
additional honest energy expenditure.
This attack can be considered a half-wormhole attack. Since, a directional antenna constitutes a private communication channel, but the node on the other end is not necessarily malicious. Packet Leashes cannot prevent this attack since they are not meant to protect against malicious message sources



2 Malicious discovery attack


In most protocols, every node will forward route discovery packets, meaning it is possible to initiate a flood by sending a single message. Systems that perform as-needed route discovery, such as AODV (Ad hoc On Demand Distance Vector) and DSR (Dynamic Source Routing) are particularly vulnerable, since nodes may legitimately initiate discovery at any time, not just during a topology change. A malicious node has a number of ways to induce a perceived topology change: it may simply falsely claim that a link is down, or claim a new link to a non-existent node. Further, two cooperating malicious nodes may claim the link between them is down. However, nearby nodes might be able to monitor communication to detect link failure. Still, short route failures can be safely ignored in networks of sufficient density. More serious attacks become possible when nodes claim that a long distance route has changed. This attack is trivial in open networks with unauthenticated routes, since a single node can emulate multiple nodes in neighbor relationships or falsely claim nodes as neighbors.



CURRENT TRENDS IN THE TECHNOLOGY

Recent advances in wireless ad-hoc sensor networks have enabled a wide range of applications of WSNs in military, traffic surveillance, target tracking, environment monitoring, healthcare monitoring, and so on. Recent advances in wireless communication technology made it possible to manufacture sensor networks where very large numbers of very small nodes are scattered across some environment in order to sense and report to a central node (user). Here we describe such type advances in WSN and their applications in various fields




4 Traffic Management and Monitoring


Every big city is suffering from traffic congestion around the world. A sincere effort is being made to solve the traffic congestion. Congestion can be alleviated by planning managing traffic. A real time automatic traffic data collection must be employed for efficient management of rush hour traffic. The vehicle tracking application is to locate a specific vehicle or moving object and monitor its movement. This work also describes design of WSN for vehicular monitoring. As the power source (battery) is limited, it is important that a design of sensor node is power efficient


CONCLUSION

Vampire attacks, a new class of resource consumption attacks that use routing protocols to permanently disable ad hoc wireless sensor networks by depleting nodes’ battery power. These attacks do not depend on particular protocols or implementations, but rather expose vulnerabilities in a number of popular protocol classes.

A number of proof-of-concept attacks against representative examples of existing routing protocols using a small number of weak adversaries, and measured their attack success on a randomly generated topology of 30 nodes have been showed. Simulation results show that depending on the location of the adversary, network energy expenditure during the forwarding phase increases from between 50 to 1,000 percent. Theoretical worst case energy usage can increase by as much as a factor of O(N) per adversary per packet, where N is the network size.

Defenses against some of the forwarding-phase attacks and described PLGPa, the first sensor network routing protocol that provably bounds damage from Vampire attacks by verifying that packets consistently make progress toward their destinations has been proposed.

Guest

May i get source code for this project my email id is anjisnair90...