Vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. A single vampire can increase network-wide energy usage by a factor of O(N), where N in the number of network nodes. This paper will use two attack on stateless protocol in which first carousel attack is an adversary sends a packet with a route composed as a series of loops, such that the same node appears in the route many times. Second, stretch attack where a malicious node constructs artificially long source routes, causing packets to traverse a larger than optimal number of nodes. The vampire attack are very difficult to detect and more over very difficult to prevent.