Cryptography Reference
In-Depth Information
Figure 2.3. Black Hole Attack
and thereby attract more traffic than usual. One of the main differences between
a Byzantine wormhole and a traditional wormhole is that in a Byzantine worm-
hole, the tunnel exists between two compromised nodes, while in a traditional
wormhole, two legitimate nodes are tricked into believing that a secure tunnel
exists between them.
Figure 2.4. Flood Rushing Attack
Search WWH ::




Custom Search