The Process to Disable ADHOC Wireless Sensor Networks by Depleting Power Using Routing Protocols

Provided by: Creative Commons
Topic: Security
Format: PDF
The consequence of vampire attacks on link-state, distance-vector, source routing and geographic and beacon routing protocols as well as a logical ID-based sensor network routing protocol. Whereas, this is by no means a comprehensive list of routing protocols which are susceptible to vampire attacks the authors analysis the covered protocols as a significant subset of the routing solution space and stress that their attacks are probable to apply to other protocols. Assuming that packet giving out drains at least as much energy from the victims as from the attacker a incessantly recharging adversary can keep at least one node enduringly disabled at the cost of its own functionality.

Find By Topic