how vampire attacks are formed?
different types of vampire attacks such as [url removed, login to view] attack 2. spretch attack 3. malicious discovery attack 4. directional antenna attack must be deallt in this work.
how to protect data packets in a adhoc wireless networks from these 4 vampire attacks must be covered?
These things should be covered in detail.
Implementation of the above things should be done in the following manner.
1. Schematic representation of the above things
2. implementation with the code
3. Working source code for presenting the same concepts mentioned above.
you can look at the attached paper below.