Minimize the Vampire Attack using WSN on Routing Protocol

Provided by: Auricle Technologies
Topic: Security
Format: PDF
As WSNs become more crucial to the everyday functioning of human being and organizations, availability faults become less tolerable. Vampire attacks are not protocol-specific, in that they do not rely on design properties or implementation faults of particular routing protocols, but rather exploit general properties of protocol classes such as link-state, distance-vector, source routing and geographic and beacon routing. A new routing path can already created path during expire time, it does not changing routing path because AODV routing protocol must maintain routing path during expire time.

Find By Topic