Issues 2
Issues 2
1.Denial of Service:
This attack is effected by making the network resource
unavailable for service to other nodes either by
consuming the bandwidth or by overloading the
system is known as denial of service.
2.Resource Consumption:
Two types of Resource- consumption attack
1. Energy depletion:
This attack depleting the battery power of critical nodes
by directing unnecessary traffic through them.
2.Buffer overflow
This attack is carried out either by felling the
routing table with unwanted routing entries or by
consuming data packet buffer space with
unwanted data.
3.Host impersonation:
A compromised internal node can act as another
node and respond with Control packets to create
wrong route entries and can terminate the path to
the destination node.
4.Information disclosure:
A compromised node can act as an informer by
deliberate disclosure of confidential information to
unauthorized nodes.
5.Interferance:
A common attack in defence application is to jam
the wireless communication by creating a wide-
spectrum noise. This should be done by single
wide band jammer sweeping across the spectrum.
The MAC and physical layer protocol an able to
handle such external threats.