Protection From Vampire Attacks on Routing Protocol

Download Now
Provided by: International Journal Of Engineering And Computer Science
Topic: Security
Format: PDF
In sensing and pervasive computing ad-hoc low-power wireless networks are an exciting research. Prior security work has first focused on denial of communication at the routing or levels of media access control. This paper examine resource depletion attacks at routing protocol layer, which disable networks by quickly draining node's battery power. These \"Vampire\" attacks are not specific to any particular protocol, but rather depend on the properties of many well known classes of routing protocols. The authors find that all examined protocols are affected to vampire attacks, which are destructing, hard to detect, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages.
Download Now

Find By Topic