... This attack infiltrates the network of 2 or more illegitimate nodes which send messages to each other using low latency and high bandwidth channel, which becomes attractive to legitimate nodes, causing them to use a compromised transmission medium. Different solution methods have been proposed for this attack [1,8,14,20,20,21,25,28,29,33,39,44,52,56,58,59,70,84,85,108,117,118,121,126,127,129,140], 27 proposals in total. ...