Research Article
A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network
Table 4
Security evaluation of our protocol.
| Attacks | How our protocol refuses the attacks |
| Access to user data in physical devices | User/password access | Compromised physical devices | Visual identity verification (authentication phase) | Identity impersonation | Visual identity verification (authentication phase) trust policies | Phishing, active spoofing, compromised data | Hashing and authentication Use of trusted chain | Data modification, compromised data | Hash function to guarantee data integrity | Lost data because of failure and battery discharge | Authentication | Compromised node | Use of algorithm to identify compromised nodes Change of trust level, trust elimination | Denial of service/data availability | Distributed data management and storage Distributed access to data services Distributed security processes | Loss of connectivity | Authentication |
|
|