نتایج جستجو برای: wormhole detection scheme
تعداد نتایج: 774238 فیلتر نتایج به سال:
A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole A...
Suppose, the Universe comes into existence (as classical spacetime) already with an empty spherically symmetric macroscopic wormhole present in it. Classically the wormhole would evolve into a part of the Schwarzschild space and thus would not allow any signal to traverse it. I consider semiclassical corrections to that picture and build a model of an evaporating wormhole. The model is based on...
Wormhole propagation plays a very important role in the product enhancement of oil and gas reservoir. A new combined hybrid mixed finite element method is proposed to solve incompressible wormhole problem with discontinuous Galerkin procedure, which, algorithm established for pressure equation, while considered concentration then porosity function computed straightly by approximate value concen...
Invention of wireless network has brought up drastic change in networking. Mobile Ad hoc NETwork (MANET) has been evolved as one of the promising technology based on implementation of wireless network. Providing mobility, flexible infrastructure, fast and low cost deplyoment are the key features of MANET. MANET is being most widely used wireless technology has limited security against network a...
The present paper is intended for studying the effect of strong gravitational lensing in context charged wormhole. To study this effect, conditions determining existence photon spheres at and outside throat are obtained. necessary sufficient or wormhole derived. Furthermore, investigated three cases different forms redshift function. These include effective (i) throat, (ii) (iii) both throat. C...
The cache coherence scheme for a scalable distributed shared memory multiproces-sor should be eecient in terms of memory overhead for maintaining the directories, as well as network latency for a memory request. In this paper, we propose a cache coherence scheme which minimizes the memory access delay and at the same time, reduces the directory overhead by using a limited directory scheme. In t...
The cache coherence scheme for a scalable distributed shared memory multiproces-sor should be eecient in terms of memory overhead for maintaining the directories, as well as network latency for a memory request. In this paper, we propose a cache coherence scheme which minimizes the memory access delay and at the same time, reduces the directory overhead by using a limited directory scheme. In t...
Routing algorithms used in wormhole switched networks must all provide a solution to the deadlock problem. If the routing algorithm allows deadlock cycles to form, then it must provide a deadlock recovery mechanism. Because deadlocks are anomalies that occur while routing, the deadlock recovery mechanism should not allocate any expensive hardware resources for the sake of handling such a rare e...
The electric charge of a wormhole mouth and the magnetic flux “linked” by the wormhole are non-commuting observables, and so cannot be simultaneously diagonalized. We use this observation to resolve some puzzles in wormhole electrodynamics and chromodynamics. Specifically, we analyze the color electric field that results when a colored object traverses a wormhole, and we discuss the measurement...
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack against ad hoc routing protocols that is particularly challenging to defend against. We show how an attacker can use the wormhole attack to cripple a range of ad hoc network routing protocols. In the wormhole attack, an attacker records ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید