Vampire Attacks: Topology Discovery in Wireless Ad Hoc Sensor Networks

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Security
Format: PDF
In this paper, the authors explore resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. The vampire attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. To mitigate these types of attacks, include a new proof-of-concept protocol and Ad hoc On-demand Distance Vector (AODV) protocol that provably bounds the damage caused by vampires during the packet forwarding phase.
Download Now

Find By Topic