Research Article

A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network

Table 4

Security evaluation of our protocol.

AttacksHow our protocol refuses the attacks

Access to user data in physical devicesUser/password access
Compromised physical devicesVisual identity verification (authentication phase)
Identity impersonationVisual identity verification (authentication phase)
trust policies
Phishing, active spoofing, compromised dataHashing and authentication
Use of trusted chain
Data modification, compromised dataHash function to guarantee data integrity
Lost data because of failure and battery dischargeAuthentication
Compromised nodeUse of algorithm to identify compromised nodes
Change of trust level, trust elimination
Denial of service/data availabilityDistributed data management and storage
Distributed access to data services
Distributed security processes
Loss of connectivityAuthentication