National Conference on Recent Trends in Computing |
Foundation of Computer Science USA |
NCRTC - Number 3 |
May 2012 |
Authors: Rohinee Bankar, Prajakta Mehetre, Swati Salve |
c0ffdf5c-6f84-4e87-91fa-358cab19f209 |
Rohinee Bankar, Prajakta Mehetre, Swati Salve . Stealthy Attacks in Wireless Ad Hoc Networks. National Conference on Recent Trends in Computing. NCRTC, 3 (May 2012), 1-3.
Stealthy packet dropping comprises two attacks: Identity Delegation and Colluding Collision. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate node. Wireless ad hoc networks do not have a router as gateway, every node can act as the gateway. The source and target node necessarily need to be out of range. The intermediate node is actually legitimate in nature, but is made to act in such a way that it does not route the packet to the destination