نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

2016
Sanjay Yadav

The minimization of power in wireless sensor network is big issue. If the process of energy constraints is optimized increase the reliability and security of mobile ADHOC network. The management of ADHOC network is great challenge due to dynamic infrastructure and mobility of node. Due to mobility of node routing path of network and security of communication suffered. In the process of node mob...

1999
Sung-Won Kim

There are two effects of extra matter fields on the Lorentzian traversable wormhole. The “primary effect” says that the extra matter can afford to be a part of source or whole source of the wormhole when the wormhole is being formed. Thus the matter does not affect the stability of wormhole and the wormhole is still safe. If the extra matter is extotic, it can be the whole part of the source of...

بهرام نصر اصفهانی, , شهرام دهدشتی, , مهدی اسحاقی, ,

  Replacing the wormhole geometry with an equivalent medium using the perturbation theory of scattering and the Born approximation, we have calculated the differential scattering cross section of electromagnetic waves by a traversable wormhole. It is shown that scattering at long wavelenghts can essentially distinguish wormhole from ordinary scattering object. Some of the zeros of the scatterin...

2014
Harleen Kaur Neetu Gupta

Wormhole attack can be destabilizes or disables wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network and forwards them with a less latency than the network links, and relays them to another point in the network. This paper describes the taxonomy of wormhole attack and presents the several scenarios of wormhole attacks. KeywordsWireles...

2008
Remo Garattini

In the Wheeler-DeWitt framework, by a gauge fixing procedure, we set up a scheme to recover a Schrödinger type equation, living in the orbits space with the lapse function as evolution parameter. By means of the associated stationary equation, we have the possibility of calculating quantum corrections to classical quantities. The Schwarzschild wormhole case is discussed as an example of applica...

2015
Neha Sahu Deepak Singh Tomar Neelam Pathak

In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm h...

2006
Adam Getchell

Wormhole travel through a Morris-Thorne-Kuhfittig metric is described. Kuhfittig’s description of a traversable wormhole is revisited, and the Morris-Thorne engineering requirements for traversable wormholes are discussed at length, giving useful parameters for physical size, mass, interior geometry, travel times, constraints upon velocity, tidal forces, and stability regimes. Wormhole construc...

2012
Moutushi Singh Rupayan Das

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc and sensor network is the wormhole attack. It is a particularly severe attack on routing protocols for ad hoc networks in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at t...

2009
Emmanouil A. Panaousis Levon Nazaryan Christos Politis

The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all rescue teams. We use the term emergency MANETs (eMANETs) in order to describe Next Generation Networks (NGNs) which are deployed in emergency cases such as forest fires and terrorist attacks. Secure routing in MANETs is critical. Due to the absence of a central authori...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید