Vampire Attacks: Topology Discovery in Wireless Ad Hoc Sensor Networks
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)Publication Date: 2014-02-28
Authors : P. Dhivya P. Sathya Priya M. Thenila;
Page : 716-720
Keywords : Ad-Hoc network; Stretch attack; Carousel attack; Vampire attack; Sensor network;
Abstract
This Project work explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. The ―Vampire‖ attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. To mitigate these types of attacks, include a new proof-of-concept protocol and AODV protocol that provably bounds the damage caused by Vampires during the packet forwarding phase.
Other Latest Articles
- Women in Corporate Boards and Financial Reporting Credibility: Evidence from Nigeria
- Oral Submucous Fibrosis- An Overview
- Chemopreventive Potential of Diosgenin against 7, 12-**Dimethylbenz (A) Anthracene (DMBA) Induced Skin Carcinogenesis in Mice
- Racial Variation of Interleukin-6 in Soccer Players: The Effect of Short-Term Maximal Exercise
- Dementia Care in India: Issues and Prospects
Last modified: 2014-03-01 20:04:18