Exposure and Verification of Neighbour Positions and Exhausting Existence From Wireless Ad Hoc Net Work

Provided by: Institute of Research and Journals (IRAJ)
Topic: Security
Format: PDF
In this paper, the authors propose a fully dispersed cooperative solution that is robust against independent and colluding adversaries, and can be impair only by an overwhelming presence of adversaries. Results show that their protocol can thwart more than 99 percent of the attacks under the best possible conditions for the adversaries, with smallest false positive rates. These \"Vampire\" attacks are not specific to any specific protocol, but rather rely on the properties of many accepted classes of steering protocols. They find that all examined protocols are weak to Vampire attacks, which are devastating, hard to notice, and are easy to carry out using as few as one hateful insider sharing only protocol-compliant messages.

Find By Topic