نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

1995
Dhabaleswar K. Panda

This paper presents a new approach to implement global reduction operations in wormhole k-ary n-cubes. The novelty lies in using multidestination message passing mechanism instead of single destination (unicast) messages. Using pairwise exchange worms along each dimension, it is shown that complete global reduction and barrier synchronization operations , as deened by the Message Passing Interf...

1996
Emilio Leonardi Fabio Neri

0163-6804/96/$05.00 © 1996 IEEE merging bandwidth-hungry applications (distributed supercomputing, video distribution, visualization of scientific data, etc.) generate increasing demand for costeffective very-high-speed networks. Networks based on linear topologies (e.g., fiber distributed data interface, or FDDI, and distributed queue dual bus, or DQDB) are not suited for veryhigh-speed applic...

2000
MICHAEL JURCZYK

Nonuniform traffic patterns can severely degrade the performance of wormhole-routing multistage interconnection networks in multiprocessor systems. A wormhole-routing switch box architecture is proposed that is able to control the degrading effects of saturation trees on the uniform background traffic under nonuniform traffic patterns that are known a priori. An alternating priority mechanism i...

2011
A. Amuthan

A Mobile Ad-hoc NETwork (MANETs) follows a dynamic topology with distributed architecture. MANETs has no basic infrastructure also has no fixed access point or routers, where in the nodes moves in an undefined manner in a specified area of work. Basically, the distributed dynamic architecture is vulnerable to various kinds of attacks like blackhole, wormhole flooding, etc. Providing a security ...

2011
Ahmad Heidari

Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...

2006
Lei Tang Xiaoyan Hong Phillip G. Bradford

Relative location information is very useful in vehicular networks although it is vulnerable to various attacks. Many techniques have been proposed for relative positioning and location verification. Due to the high speed and the strict security requirements, the existing relative positioning and location verification techniques are not directly applicable to vehicular networks. Hence we presen...

2013
Hyeon Myeong Choi Su Man Nam Tae Ho Cho

Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes...

Journal: :International Journal of Computer Applications 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید