36
Ad HoC Mobile Wireless netWorks
1.3.3.2.4 Jellyfish Attack Similarly to the black hole attack, a jellyfish
attacker first needs to intrude into the forwarding group and then it
delays data packets unnecessarily for some amount of time before for-
warding them. is results in significantly high end-to-end delay and
delay jitter and thus degrades the performance of real-time applications.
1.3.3.3 Interconnection of Mobile Ad Hoc Networks and the Internet e
interconnection of mobile ad hoc networks to fixed IP networks is one
of the topics receiving more attention within the MANET working
group of the IETF as well as in many research projects funded by the
European Union. Several solutions have recently been proposed, but
at this time it is u