Esta actividad me pareció muy bien por lo cual es como un conocimiento que la profa nos podrá identificar como alumnos para conocernos mas personalmente.
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...IAEME Publication
Ad hoc networks are vulnerable to attacks due to mobility of nodes in a dynamic network where nodes can its position at any point of time. In MANeT, a lot of attacks can be initiated but most of them are comparatively easy to detect because of their property of dramatically changing the network data. It is very vital when considering security issues of MANET to consider wormhole attack, which is complex to detect & can spoil important data by directing to illegal nodes. It consists of two malicious nodes and a tunnel among them through which an attacker tunnel the data. In the route discovery process, a wormhole can relay route request and response messages between far-away nodes, creating the manifestation of shorter path to destination.
Esta actividad me pareció muy bien por lo cual es como un conocimiento que la profa nos podrá identificar como alumnos para conocernos mas personalmente.
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...IAEME Publication
Ad hoc networks are vulnerable to attacks due to mobility of nodes in a dynamic network where nodes can its position at any point of time. In MANeT, a lot of attacks can be initiated but most of them are comparatively easy to detect because of their property of dramatically changing the network data. It is very vital when considering security issues of MANET to consider wormhole attack, which is complex to detect & can spoil important data by directing to illegal nodes. It consists of two malicious nodes and a tunnel among them through which an attacker tunnel the data. In the route discovery process, a wormhole can relay route request and response messages between far-away nodes, creating the manifestation of shorter path to destination.