نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

2001
Johan Vounckx G. Deconinck R. Lauwereins J. A. Peperstraete

In this paper we present a routing scheme which is extremely suited for use in massively parallel systems . The routing algorithm is fault-tolerant so that network failures will not stop the system. For reasons of scalability, the routing information is extremely compact, also when the network is injured . The wormhole routing technique guarantees very low routing latency . Moreover the routing...

1997
Po-Chi Hu Leonard Kleinrock

Po-Chi Hu Lucent Technologies Inc. 200 Schulz Drive Red Bank, NJ 07701 Leonard Kleinrocky Department of Computer Science University of California, Los Angeles Los Angeles, CA 90095-1596 Abstract In a previous paper [1], we proposed and analyzed a timeout scheme to alleviate network congestion and thus improve the throughput for a wormhole routing network in local area network (LAN) environments...

1996
Ram Kesavan Dhabaleswar K. Panda

This paper presents a new approach to minimize node contention while performing multiple multicast on wormhole k-ary n-cube networks with overlapped destination sets. The existing multicast algorithms in the literature deliver poor performance under multiple multicast because these algorithms have been designed with only single multicast in mind. Our algorithms use only local source-specific in...

2008
N. J. Sun

On this paper we consider the classical wormhole solution of the Born-Infeld scalar field. The corresponding classical wormhole solution can be obtained analytically for both very small and large φ̇. At the extreme limits of small φ̇ the wormhole solution has the same format as one obtained by Giddings and Strominger[10]. At the extreme limits of large φ̇ the wormhole solution is a new one. The wo...

2004
Lingxuan Hu David Evans

Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. To date, no general defenses against wormhole attacks have been proposed. This paper presents an analysis of wormhole attacks and proposes a countermeasure using directional antennas. We present a cooperative protocol whereby nodes share directional information to preven...

Journal: :Int. Arab J. Inf. Technol. 2012
Rajaram Ayyasamy Palaniswami Subramani

In Mobile Ad-hoc Networks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. Our previous work established a network consisting confidentiality and authentication of packets in both routing and link layers. As an extension to our previous work, in this paper, we propose to develop an enhanced distributed certificate au...

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

2005
V. Faraoni W. Israel

The time evolution of a wormhole in a Friedmann universe approaching the Big Rip is studied. The wormhole is modeled by a thin spherical shell accreting the superquintessence fluid – two different models are presented. Contrary to recent claims that the wormhole overtakes the expansion of the universe and engulfs it before the Big Rip is reached, it is found that the wormhole becomes asymptotic...

Journal: :Electronics 2022

The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A network consists sensors prone to various security threats. These nodes make a vulnerable denial-of-service attacks. One them wormhole attack that uses low latency link between two malicious and affects the routing paths entire network. This brutal as it resistant many cryptographi...

1997
Juan Miguel Martínez Pedro López José Duato Timothy Mark Pinkston

Networks using wormhole switching have traditionally relied upon deadlock avoidance strategies for the design of deadlock-free routing algorithms. More recently, deadlock recovery strategies have begun to gain acceptance. In particular, progressive deadlock recovery techniques are very attractive because they allocate a few dedicated resources to quickly deliver deadlocked packets, instead of k...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید