Research Article

A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network

Figure 2

Illustration of the security vulnerability in lookup and routing: (i) Malicious node receives MREP/MREQ for node and pretends as an anchor node for node or as destination node . (ii) Malicious node receives all data packets from node rather than the destination node. (iii) The LID of node depends on the LID of node ; node can also temper the LID of node if it gets malicious.