نتایج جستجو برای: wormhole tunnel

تعداد نتایج: 37770  

2009
P. Szymczak A. J. C. Ladd

During the dissolution of porous rock, positive feedback between fluid transport and mineral dissolution leads to the spontaneous formation of pronounced wormhole-like channels. In a recent paper, Cohen et al. (2008) analyzed wormhole growth and competition in a dissolving porous rock, using a Darcy-scale numerical model developed by Golfier et al. (2002). In particular, they analyzed the compe...

Journal: :ECEASST 2011
Elmar Gerhards-Padilla Nils Aschenbruck Peter Martini

Routing Attacks are a serious threat to communication in tactical MANETs. TOGBAD is a centralised approach, using topology graphs to detect such attacks. In this paper, we present TOGBAD’s newly added wormhole detection capability. It is an adaptation of a wormhole detection method developed by Hu et al. This method is based on nodes’ positions. We adapted it to the specific properties of tacti...

2007
Maitreya Natu Adarshpal S. Sethi

In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole attack using a combination of active probing and passive monitoring tools. We exploit anomaly in the end-to-end delay and per-hop delay patterns to identify the nodes involved in a wormhole attack. We present an architec...

1998
Matt Visser

It is by now apparent that topology is too crude a tool to accurately characterize a generic traversable wormhole. In two earlier papers we developed a complete characterization of generic but static traversable wormholes, and in the present paper extend the discussion to arbitrary time-dependent (dynamical) wormholes. A local definition of wormhole throat, free from assumptions about asymptoti...

1997
Jin Young Kim

We study the Giddings–Strominger wormholes in string theories. We found a non–singular wormhole solution and analyzed the perturbation around this wormhole solution. We have used the bilinear action to obtain Schrödinger– type equation for perturbation fields assuming a linear relation between the perturbation fields. With this analysis, we found an infinite number of negative modes among O(4)–...

2004
A. DeBenedictis

We consider wormhole geometries subject to a gravitational action consisting of non-linear powers of the Ricci scalar. Specifically, wormhole throats are studied in the case where Einstein gravity is supplemented with a Ricci-squared and inverse Ricci term. In this modified theory it is found that static wormhole throats respecting the weak energy condition can exist. The analysis is done local...

Journal: :Microprocessors and Microsystems - Embedded Hardware Design 1998
Olav Lysne

We study the problem of predicting the performance of wormhole routed networks. A model of a single wormhole router is developed, and unlike previous methods we do the development by a probability analysis rather than queuing theory. The model is evaluated through a series of it level simulations. Then we indicate how our model can be extended to networks of routers, and argue that this extensi...

1997
M. Yu. Konstantinov

The conditions of the traversable wormhole joining with the exterior space-time are considered in details and the mixed boundary problem for the Einstein equations is formulated. It is shown that, in opposite to some declarations, the conditions of the wormhole joining with the exterior space-time have non-dynamical nature and can not be defined by the physical processes. The role of these cond...

2003
Yih-Chun Hu Adrian Perrig David B. Johnson

As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wo...

2012
He Ronghui Ma Guoqing Wang Chunlei Fang Lan

This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید