• The wormhole attack is easy to implement and has a huge destructiveness.

    攻击容易实现且破坏性大的攻击。

    youdao

  • The influence of wormhole attack on the node's number of neighbors is analyzed, and a logic topology based method is proposed for attack detection.

    分析了攻击对于网络节点邻居数目影响提出了一种基于网络逻辑拓扑的攻击检测方法

    youdao

  • Encryption and authentication mechanism has no use to defend against wormhole attack. It is need to embed corresponding mechanism in routing protocol to guarantee security.

    攻击容易发动,很难被检测,一般的加密认证方式不能防御虫洞攻击,需要路由协议有针对性添加特定的安全机制

    youdao

  • Encryption and authentication mechanism has no use to defend against wormhole attack. It is need to embed corresponding mechanism in routing protocol to guarantee security.

    攻击容易发动,很难被检测,一般的加密认证方式不能防御虫洞攻击,需要路由协议有针对性添加特定的安全机制

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定