Innovations and Trends in Computer and Communication Engineering |
Foundation of Computer Science USA |
ITCCE - Number 3 |
December 2014 |
Authors: Priti Lahane |
723680a6-978e-4c20-89d8-4c058feae7e3 |
Priti Lahane . A comparative study of the Attacks on the Routing Protocol. Innovations and Trends in Computer and Communication Engineering. ITCCE, 3 (December 2014), 23-25.
A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network. However, because routing protocol communicates with immediate neighbors and throughout the network it is vulnerable to different kinds of attack which hampers the availability of nodes in case of ad-hoc networks. This paper presents a comparative study of the attacks on the routing protocol. They are mainly sleep deprivation attack, Dos attack, state full protocol attack, stateless protocol attack, wormhole attack and vampire attack. This has been done by studying the impact these attacks gives on routing protocol. This would pavethe way to build a head-to-head comparative study that shows the kind of damage these protocols can cause and make protocols working miserable.