Minimize the Vampire Attack using WSN on Routing Protocol

Download Now
Provided by: Auricle Technologies
Topic: Security
Format: PDF
As WSNs become more crucial to the everyday functioning of human being and organizations, availability faults become less tolerable. Vampire attacks are not protocol-specific, in that they do not rely on design properties or implementation faults of particular routing protocols, but rather exploit general properties of protocol classes such as link-state, distance-vector, source routing and geographic and beacon routing. A new routing path can already created path during expire time, it does not changing routing path because AODV routing protocol must maintain routing path during expire time.
Download Now

Find By Topic