Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks

Provided by: Creative Commons
Topic: Networking
Format: PDF
The authors describe a resource depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the same destination though using different packet headers. These are also called Vampire attacks. They calculate the strength of the attack by the ratio of network energy used in the benevolent case to the energy used in the malicious case i.e. the ratio of network-wide power utilization with malevolent nodes present to energy convention with only honest nodes when the number and size of packets sent remains invariable.

Find By Topic