From: An improved AODV routing security algorithm based on blockchain technology in ad hoc network
Environment/conditions | Strategy adopted | Failure situation |
---|---|---|
The environment is good and malicious nodes exist | Two paths | Uneven distribution of nodes |
The environment is good and malicious nodes do not exist | Rerouting from breakpoint | Uneven distribution of nodes |
The environment is bad and malicious nodes exist | Rerouting from the source node | Uneven distribution of nodes |