Provided by: International Journal of Advanced Engineering, Management and Science (IJAEMS)
Topic: Enterprise Software
Date Added: Apr 2015
Ad-hoc wireless networks are an exciting research direction in sensing and pervasive computing. Advance security work in this area has been primarily focused on denial of communication at the routing or medium access control levels. There is a common attack at routing protocol layer, i.e. resource depletion attack, which permanently disables networks by drastically draining nodes' battery power. These "Vampire" attacks are not similar to any specific protocol, but rather depend upon the properties of many popular classes of routing protocols like link state and DSR (Dynamic Source Routing) protocols.