Date Added: Apr 2012
Stealthy attacks are routing attacks which "Minimize the cost to and visibility of the attacker, but which are about as harmful as Brute force attacks. These allow a skilled but not very powerful attacker to target communication networks in a way that makes it unlikely that he gets traced and caught. Stealthy packet dropping is a suite of four attacks misrouting, power control, identity delegation, and colluding collision that can be easily launched against multi-hop wireless ad hoc networks. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it performs the legitimate forwarding action.