A defending of wormhole attack in wireless mesh network based on epigraph relay method and cooperative threading technique
نویسندگان
چکیده
The proper management of wireless mesh network is a challenging task due to the mobility of node and velocity of node. All devices work in open channel area due to this security is very challenging task. Because due to mobility and open channel area possibility of threats and attacks are very high. On the basis of related work we found data wormhole attack is a serious attack in the environments of wireless mesh network. Various methods and applications are used for the prevention of wormhole attack, but all these method and process are not up to mark. Now we get idea about wormhole attack and prevention of wormhole attack. Here any method or process does not work in the level of network for the prevention of wormhole attack. In this dissertation we proposed a new model for prevention and detection of wormhole attack in wireless mesh network. The proposed model based on epigraph relay method (ERM) and cooperative threading process.
منابع مشابه
Sum-Rate Maximization Based on Power Constraints for Cooperative AF Relay Networks
In this paper, our objective is maximizing total sum-rate subject to power constraints on total relay transmit power or individual relay powers, for amplify-and-forward single-antenna relay-based wireless communication networks. We derive a closed-form solution for the total power constraint optimization problem and show that the individual relay power constraints optimization problem is a quad...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملMachine Learning Techniques for Wormhole Attack Detection Techniques in Wireless Sensor Networks
The wormhole attack in Wireless sensor networks (WSNs) decreases the network performance by dropping the No. of Packets. Many techniques have been proposed to so far reduce the impact of the wormhole attack by detecting and preventing it. But, related work indicates that no technique is perfect for every kind of circumstances of WSNs. Among the existing techniques, Watchdog technique has better...
متن کاملA survey on wormhole attacks on Wireless Mesh Networks and its detection
Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...
متن کاملA Study on Detecting Wormhole Attack in Wireless Ad hoc Networks
In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. Thes...
متن کامل