International Journal of Computer Techniques -– Volume 3 Issue 3 , May-June 2016 ISSN :2394-2231 http://www.ijctjournal.org Page 14 Vampire Attacks: Detection And Prevention Devikarani Roy 1 , Shilpa Verma 2 1 (ME Student, Department of Computer Engineering, Thadomal Shahani Engineering College, Mumbai University, Mumbai-50) 2 (Associate Professor, Department of Computer Engineering, Thadomal Shahani Engineering College, Mumbai University, Mumbai-50) ----------------------------------------************************---------------------------------- Abstract: Wireless Sensor Networks (WSNs) are used nowadays, and therefore have broad range of interesting applications. WSN can be of hypersensitive nature and therefore might require enhanced secured environment. In today's world WSNs are the basic means of communication. The resources like battery power, processing capabilities, communication and transmitting range are limitations of the system. One of the major challenges in Wireless Networks is the security concerns. Attacks affecting these types of systems are increasing. One of the major resource consumption attacks called vampire attacks. It includes Stretch attack and Carousal attack which affects node and even bring down the entire system by draining the Battery power. In Stretch Attack, attackers construct wrong long routes which leads to traversing almost every node in the network. Stretch attack, increases packet route length, and packets get processed by a number of nodes. Carousel attackers introduce some packet within a route tranquil as a sequence of loops, and so the same node appears in the route many times. The proposed system overcomes this challenge by using the techniques which include the Energy weight detection algorithm and Route Tracking algorithm, so energy consumption is reduced to a great extent. EWDA and Route Tracking algorithm is used to detect and prevent the above problems. Keywords —Networking, WSNs, Stretch attack, Carousal attack, EWDA , Routing algorithm, NS2 ----------------------------------------************************------------------------------- I. INTRODUCTION Vampire attacks which are the most common Energy depletion attacks where the energy consumed by the network to compose and transmit a message is more when its compared to that of an ordinary network. Vampire attacks distort the working of a network immediately rather than work overtime to entirely disable a network. The proposed system overcomes this challenge by using the techniques which include the Energy weight detection algorithm and Route Tracking algorithm so energy consumption is reduced to a great extent. Wireless ad-hoc networks are particularly prone to denial of service (DOS) attacks due to their ad- hoc organization. Vampire attack can be defined as the formation and transmission of a message that causes more energy to be consumed by the network in comparison to an honest node transmitted a message of same size to the same destination, by using different packet headers. We can calculate the potency of the attack by the ratio of network energy used in the honest case to the energy used in the malicious case. There are two main types of vampire attacks. In the carousal attack, an adversary composes packets with routing loops, it targets source routing protocols, allowing a single packet to repeatedly traverse the same set of nodes . The second type of attack i.e. stretch attack also targeting source routing, where attacker constructs artificially long routes, which leads to almost traversing every node in the network. We call this the stretch attack, since it increases packet route lengths, causing packets to be transmitted by a number of nodes that is liberal of hop count along the shortest path between the packet destination and attacker . The impact of these attacks can be further increased by linking them, increasing the number of adverse nodes in the network, or by simply sending RESEARCH ARTICLE OPEN ACCESS