نتایج جستجو برای: wormhole tunnel
تعداد نتایج: 37770 فیلتر نتایج به سال:
In-band wormhole attacks undermine routing by attracting network traffic that otherwise may have bypassed the attackers via alternate, lower-cost routes. The result gives the attackers control over the attracted traffic, allowing them to modify, delay, redirect, eavesdrop, or drop the traffic. In this paper we expand upon the gravitational analysis technique, first presented in [KSG06], for eva...
The conditions of the traversable wormhole joining with the exterior space-time are considered in details and the mixed boundary problem for the Einstein equations is formulated. It is shown that, in opposite to some declarations, the conditions of the wormhole joining with the exterior space-time have non-dynamical nature and can not be defined by the physical processes. The role of these cond...
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wo...
Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can’t be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a hig...
Wireless networking relies on a fundamental building block, neighbor discovery (ND). However, the nature of wireless communications makes attacks against ND easy: an adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes they communicate directly. Such attacks can compromise the overlying protocols and applications. Proposals in the literature ...
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending me...
In this paper I present a spacetime of two open universes connected by a Lorentzian wormhole. The spacetime has the following features: (1) It can exactly solve the Einstein equations; (2) The weak energy condition is satisfied everywhere; (3) It has a topology of R2 × Tg (g ≥ 2); (4) It has no event horizons.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید