نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

Journal: :EURASIP J. Wireless Comm. and Networking 2016
GuHsin Lai

New communication networks are composed of multiple heterogeneous types of networks including Internet, mobile networks, and sensor networks. Wireless sensor networks have been applied to various businesses and industries since the last decade. Most sensors have the ability of communication and the requirement of low power consumption. 6LoWPAN (IPv6 over Low Power Wireless Personal Area Network...

Journal: :Journal of Systems Architecture 2004
Gwo-Jong Yu Chih-Yung Chang Tzung-Shi Chen

In a mesh multicomputer performing jobs needs to schedule submeshes according to some processor allocation scheme In order to assign the incoming jobs to a free submesh a task compaction scheme is needed to generate a larger contiguous free region The overhead of com paction depends on the e ciency of the task migration scheme In this paper two simple task migration schemes are rst proposed in ...

2016
Madan Mohan Malaviya

Wireless sensor networks passes a practical and Economically feasible alternative to manual data association in general and military scenarios, providing a means of surveillance of a region of field and providing warning of any threats. In common wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless association with high-bandwidth low-latency bo...

2007
Yen-Wen Lu Kallol Bagchi James B. Burr Allen M. Peterson

Wormhole routing is an attractive scheme for large mul-ticomputer networks. In this paper, we include several such representative schemes and make performance comparisons via simulation on an N N torus with nearest neighbor connections. A systematic performance scheme is followed, which shows that among all these 6 algorithms, worm1, a hill-climbing version, has a better performance. worm1, in ...

2007

In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have...

1996
Po-Chi Hu Leonard Kleinrock

Wormhole routing i s a s imple, low-cost switching scheme o f ten used f o r supercomputer interconnect ions. Recently, at also has been applied t o high-speed local area ne tworks t o support applications demanding high-datarate communicat ions , such as c luster computing. T h e drawback t o wormhole routing i s i t s low link e f i c i ency caused by w o r m blocking. T o overcome th is bloc...

2003
Zhen Chen Zengji Liu Zhiliang Qiu

In this paper, we propose a deadlock-free wormhole routing scheme called the Zigzag routing for the panMesh, which generalizes the mesh topology. Accordingly, we prove that only two virtual channels are needed for deadlock-freeness on every physical channel by using the Zigzag routing.

2014
Akansha Agrawal Amit Saxena

The wormhole attack is considered a serious threat to the security in multi-hop ad hoc networks. In wormhole attack, the attacker makes the tunnel from one end to another network, the nodes are in a different place at both ends of the tunnel believe are true neighbours and gets the conversation through the wormhole link . Unlike many other ad hoc routing attacks, worm hole attack cannot be prev...

2013
Bhavneet Kaur Sandeep Singh Kang

Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The latter are equipped with sensing, computation, and wireless communications capabilities, and have very limited resources. Wireless sensor networks have been widely used in remote areas, military scenarios, sensing motion applications, agriculture solutions ...

2017
Mandeep Kaur Avinash Jethi

The wireless sensor networks are prone to various attacks; this is primarily due to the fact that these networks once deployed are left unattended. So any attacker with the intention of stealing the information from the network can compromise any node and gain access to the data being propagated in the network. Various attacks possible are black hole attack, wormhole attack, Sybil attack, clone...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید