Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
The authors describe a resource depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. They calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable.
Download Now

Find By Topic