Provable Security Against Vampire Attacks From WSN

Download Now
Provided by: Creative Commons
Topic: Networking
Format: PDF
The \"Vampire\" attacks are not precise to any detailed etiquette but quite rely on the properties of various popular classes of routing protocols. Examined protocols are vulnerable to Vampire attacks which are devastating, difficult to detect and are simple to carry out by means of few as one malicious insider transfer only protocol-compliant messages. A single vampire can augment network-wide energy usage by a factor of O (N), where N in the number of network nodes. The authors discuss methods to alleviate these types of attacks including a new proof-of-concept protocol that provably limits the damage caused by vampires throughout the packet forwarding phase.
Download Now

Find By Topic