نتایج جستجو برای: wormhole tunnel

تعداد نتایج: 37770  

2008
Richard Gopaul Peter Kruus Dan Sterne Brian Rivera

In-band wormhole attacks undermine routing by attracting network traffic that otherwise may have bypassed the attackers via alternate, lower-cost routes. The result gives the attackers control over the attracted traffic, allowing them to modify, delay, redirect, eavesdrop, or drop the traffic. In this paper we expand upon the gravitational analysis technique, first presented in [KSG06], for eva...

1997
M. Yu. Konstantinov

The conditions of the traversable wormhole joining with the exterior space-time are considered in details and the mixed boundary problem for the Einstein equations is formulated. It is shown that, in opposite to some declarations, the conditions of the wormhole joining with the exterior space-time have non-dynamical nature and can not be defined by the physical processes. The role of these cond...

Journal: :Physical Review D 2015

Journal: :Journal of Physics: Conference Series 2015

Journal: :American Journal of Physics 2015

2001
Yih-Chun Hu Adrian Perrig David B. Johnson

As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wo...

2013
Huaiyu Wen Guangchun Luo

Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can’t be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a hig...

2008
Reza Shokri Marcin Poturalski Gael Ravot Panos Papadimitratos Jean-Pierre Hubaux

Wireless networking relies on a fundamental building block, neighbor discovery (ND). However, the nature of wireless communications makes attacks against ND easy: an adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes they communicate directly. Such attacks can compromise the overlying protocols and applications. Proposals in the literature ...

2009
Zaw Tun Aung Htein Maw

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending me...

2000
Li-Xin Li

In this paper I present a spacetime of two open universes connected by a Lorentzian wormhole. The spacetime has the following features: (1) It can exactly solve the Einstein equations; (2) The weak energy condition is satisfied everywhere; (3) It has a topology of R2 × Tg (g ≥ 2); (4) It has no event horizons.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید