what is wormhole using protocol deviations??
ananthu1987 14-January-2010 08:35:45 PM

Comments


A wormhole attack can also be done through protocol deviations.

For details visit:

arxiv.org/pdf/0906.1245
Posted by sagitraz


http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.120.3597&rep=rep1&type=pdf
Posted by martinsyrus



Posted: 17-January-2010 12:31:55 PM By: martinsyrus

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.120.3597&rep=rep1&type=pdf

Posted: 20-January-2010 07:08:20 AM By: sagitraz

A wormhole attack can also be done through protocol deviations.

For details visit:

arxiv.org/pdf/0906.1245