ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)

Publication Date:

Authors : ;

Page : 328-336

Keywords : WSN; Routing; malicious adversaries; lamia attacks;

Source : Downloadexternal Find it from : Google Scholarexternal


Ad hoc low-power wireless networks square measure an exciting analysis direction in sensing and pervasive computing. Previous security work in this space has targeted totally on denial of communication at the routing or medium access management levels. It explores resource depletion attacks at the routing protocol layer that for good disable networks by quickly exhausting nodes battery power. These “Vampire” attacks don't seem to be specific to any specific protocol, however rather trust the properties of the many standard categories of routing protocols. We discover that each one examined protocols square measure liable to lamia attacks, that square measure devastating, troublesome to observe, and are easy to hold out victimization as few in concert malicious business executive causation solely protocol-compliant messages. We have a tendency to discuss ways to mitigate these styles of attacks, as well as a brand new proof-of-concept protocol that incontrovertibly bounds the injury caused by Vampires during the packet forwarding section.

Last modified: 2014-02-20 13:16:23