Abstract

Wireless networks are an ideal research direction in the areas of sensors and pervasive computing. Wireless ad-hoc sensor networks are a new platform in the fields of remote sensing, data collection, analysis, problem solving, and various research studies. They contain nodes that act as transmitters and receivers, and are vulnerable to various attacks and incur various types of loss. Resource exhaustion attacks, once considered just a routing problem, now fall into a new group called "vampire attacks." A resource exhaustion or vampire attack drains a node's batteries, rendering them useless. Vampire attacks are not specific protocols and are hard to spot. This paper examines the identification and protection of resource exhaustion attacks at the routing protocol layer using the PLGP protocols (Parno, Luk, Gaustad, and Perrig). This white paper focuses primarily on detecting and preventing vampire attacks. The proposed method is used to prevent network node exhaustion. This greatly reduces the problem of vampire attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call