نتایج جستجو برای: wormhole tunnel
تعداد نتایج: 37770 فیلتر نتایج به سال:
A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks w...
It is well known that a C-field, generated by a certain source equation leads to interesting changes in the cosmological solutions of Einstein's equations. In this article we present and analyze a simple Lorentzian vacuum wormhole in the presence of C-field. The wormhole is very interesting subject in modern cosmology since Morris and Throne have verified the realistic possibilities of construc...
Wormhole attack is a type of replay attack in wireless networks that has serious consequences and is hard to defend against. This is because the attacker does not need to modify packets or compromise wireless nodes. This paper introduces Wormeros, a new framework to detect wormhole attacks in wireless networks. The framework contains two phases namely suspicion and confirmation. Our solution do...
This paper presents an analytical evaluation of the performance of adaptive wormhole routing in a two-dimensional torus. Our analysis focuses on minimal and fully adaptive wormhole routing that allows a message to use any shortest path between source and destination. A validation of the analysis through simulation is presented to demonstrate the accuracy of the obtained results. Finally, we rem...
We construct a static axisymmetric wormhole from the gravitational field of two charged shells which are kept in equilibrium by their electromagnetic repulsion. For large separations the exterior tends to the Majumdar-Papapetrou spacetime of two charged particles. The interior of the wormhole is a Reissner-Nordström black hole matching to the two shells. The wormhole is traversable and connects...
Wormhole boundary conditions for the Wheeler-DeWitt equation can be derived from the path integral formulation. It is proposed that the wormhole wave function must be square integrable in the maximal analytic extension of minisuperspace. Quantum wormholes can be invested with a Hilbert-space structure, the inner product being naturally induced by the minisuperspace metric, in which the Wheeler-...
In this paper we are comparing (via simulations) under real conditions, several routing algorithms based either on oblivious worm-hole routing or deeection routing. Although these two techniques diier signiically in the low level structure of information (worms, packets), we derived realistic results using an appropriate simulation model. In our experiments we compared average time, latency and...
As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad hoc Networks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes are able to disrupt a major component ...
We discuss the calculation of semi-classical wormhole vertex operators from wave functions which satisfy the Wheeler-deWitt equation and momentum constraints, together with certain ‘wormhole boundary conditions’. We consider a massless minimally coupled scalar field, initially in the spherically symmetric ‘mini-superspace’ approximation, and then in the ‘midi-superspace’ approximation, where no...
We study p = −1 D-brane in type IIB superstring theory. In addition to D-instanton, we obtain the D-wormhole solution in the Einstein frame. This corresponds to the ten-dimensional singular wormhole solution with infinite euclidean action.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید