International Journal of Computer Science and Mobile Computing (IJCSMC)
Ad hoc low-power wireless networks square measure an exciting analysis direction in sensing and pervasive computing. Previous security work in this space has targeted totally on denial of communication at the routing or medium access management levels. It explores resource depletion attacks at the routing protocol layer that for good disable networks by quickly exhausting nodes battery power. These \"Vampire\" attacks don't seem to be specific to any specific protocol, however rather trust the properties of the many standard categories of routing protocols.