...ckhole List ; List of other black holes ; List of black hole candidates 黑洞攻击 packet drop attack ; Black hole attack 恒星黑洞 stellar black hole ..
基于8个网页-相关网页
Security leak was found after the deep study of the OLSR routing algorithm, that OLSR has no security mechanisms, malicious nodes can perform many attacks, such as black hole attack, wormhole attack and sleep consumption attack .
深入剖析了OLSR协议的工作原理之后,发现OLSR协议本身并没有提供安全机制,攻击者可以轻松地实现对网络的各种攻击,如黑洞攻击、虫洞攻击和睡眠剥夺攻击等。
参考来源 - 移动自组网路由协议的改进与应用研究·2,447,543篇论文数据,部分数据来源于NoteExpress
10 or more kills with a single Black Hole attack.
用黑洞攻击消灭10或者更多人。
The black hole attack and the gray hole attack on the networks running under the AODV protocol are discussed.
重点讨论在AODV协议下的黑洞攻击和灰洞攻击,并根据攻击的特点,提出了一种利用虫洞原理防御的策略。
In this paper the working processes of AODV routing protocol and the essence of black hole attack are analyzed in detail, and a solution to Black Hole Attack is proposed.
针对该问题,文中在详细分析了AODV路由协议的运行原理和数据黑洞攻击问题实质的基础上对AODV协议进行了改进。
应用推荐