Vampire attacks: Draining life from wireless ad hoc sensor networks

EY Vasserman, N Hopper - IEEE transactions on mobile …, 2011 - ieeexplore.ieee.org
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …

Secure and quality of service assurance scheduling scheme for wban with application to ehealth

M Barua, MS Alam, X Liang… - 2011 IEEE Wireless …, 2011 - ieeexplore.ieee.org
Wireless Body Area Network (WBAN) is gaining popularity due to its large scale of
applications in eHealth. Due to its critical and real-time nature, eHealth care system must …

Network-on-Chip interconnect for pairing-based cryptographic IP cores

T English, E Popovici, M Keller, WP Marnane - Journal of Systems …, 2011 - Elsevier
On-chip data traffic in cryptographic circuits often consists of very long words or large groups
of smaller words exchanged between processing elements. The resulting wide cross-chip …

[PDF][PDF] Securing on demand source routing protocol in mobile Ad-Hoc networks by wormhole attacks

P Butle, R Dev, A Dalvi, M Dautpure - Int Res J Eng Technol (IRJET), 2018 - academia.edu
A mobile ad hoc network (MANET), is a kind of wireless network which is infrastructure-less
and adaptive in nature. MANET follows multicast communication as many applications in …

[PDF][PDF] Analysis of Secure Routing Scheme against Vampire Attack for MANET

P Rathore, A Tiwari, H Rathore, P Rathore… - International …, 2016 - academia.edu
Wireless networks are gaining popularity to its peak today, as the users want wireless
connectivity irrespective of their geographic position. There is an increasing threat of attacks …

[PDF][PDF] EFFICIENCY GAIN ON WSN (WIRELESS SENSOR NETWORKS) FOR LEECH ATTACKS

S REHANA, PS AHAMED, P BABU - scholar.archive.org
Ad-hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …

[PDF][PDF] Overview on Depletion Attacks Hindering Network Efficiency

T LAVANYA, BP KUMAR - core.ac.uk
Traditional works on secure routing attempts to make sure those adversaries cannot make
discovering of path for returning an unacceptable network path. In our work, we define …

Hardware processors for pairing-based cryptography

R Ronan - 2016 - cora.ucc.ie
Bilinear pairings can be used to construct cryptographic systems with very desirable
properties. A pairing performs a mapping on members of groups on elliptic and genus 2 …

[PDF][PDF] A Survey on Different Attacks in Wireless Sensor Ad-Hoc Network

S GUPTA, H CHAWLA - 2016 - ijsetr.com
Mobile Ad-hoc Network (MANET) is a technology used to create a wireless network without
pre existing infrastructure. In MANET nodes be free to move dynamically form a network to …

[PDF][PDF] VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS: EVALUATION AND PROTECTION

F Fatima, L Sunitha, EV Ramana - academia.edu
A vampire attack is caused by the malicious node on the decentralized ad hoc wireless
network. The paper analyses how protocols faces these attacks. Vampire attacks are not …