what is wormhole using protocol deviations?? ananthu1987 14-January-2010 08:35:45 PMComments A wormhole attack can also be done through protocol deviations. For details visit: arxiv.org/pdf/0906.1245 Posted by sagitraz http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.120.3597&rep=rep1&type=pdf Posted by martinsyrus |
Posted: 17-January-2010 12:31:55 PM By: martinsyrus http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.120.3597&rep=rep1&type=pdf | |
Posted: 20-January-2010 07:08:20 AM By: sagitraz A wormhole attack can also be done through protocol deviations. For details visit: arxiv.org/pdf/0906.1245 |