Vampire Attacks: Protocol Routing Infrastructure in Wireless Sensor Networks

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Networking
Format: PDF
Ad hoc low-power wireless networks square measure an exciting analysis direction in sensing and pervasive computing. Previous security work in this space has targeted totally on denial of communication at the routing or medium access management levels. It explores resource depletion attacks at the routing protocol layer that for good disable networks by quickly exhausting nodes battery power. These \"Vampire\" attacks don't seem to be specific to any specific protocol, however rather trust the properties of the many standard categories of routing protocols.
Download Now

Find By Topic