نتایج جستجو برای: wormhole detection scheme
تعداد نتایج: 774238 فیلتر نتایج به سال:
In this paper we present a routing scheme which is extremely suited for use in massively parallel systems . The routing algorithm is fault-tolerant so that network failures will not stop the system. For reasons of scalability, the routing information is extremely compact, also when the network is injured . The wormhole routing technique guarantees very low routing latency . Moreover the routing...
Po-Chi Hu Lucent Technologies Inc. 200 Schulz Drive Red Bank, NJ 07701 Leonard Kleinrocky Department of Computer Science University of California, Los Angeles Los Angeles, CA 90095-1596 Abstract In a previous paper [1], we proposed and analyzed a timeout scheme to alleviate network congestion and thus improve the throughput for a wormhole routing network in local area network (LAN) environments...
This paper presents a new approach to minimize node contention while performing multiple multicast on wormhole k-ary n-cube networks with overlapped destination sets. The existing multicast algorithms in the literature deliver poor performance under multiple multicast because these algorithms have been designed with only single multicast in mind. Our algorithms use only local source-specific in...
On this paper we consider the classical wormhole solution of the Born-Infeld scalar field. The corresponding classical wormhole solution can be obtained analytically for both very small and large φ̇. At the extreme limits of small φ̇ the wormhole solution has the same format as one obtained by Giddings and Strominger[10]. At the extreme limits of large φ̇ the wormhole solution is a new one. The wo...
Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. To date, no general defenses against wormhole attacks have been proposed. This paper presents an analysis of wormhole attacks and proposes a countermeasure using directional antennas. We present a cooperative protocol whereby nodes share directional information to preven...
In Mobile Ad-hoc Networks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. Our previous work established a network consisting confidentiality and authentication of packets in both routing and link layers. As an extension to our previous work, in this paper, we propose to develop an enhanced distributed certificate au...
The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...
The time evolution of a wormhole in a Friedmann universe approaching the Big Rip is studied. The wormhole is modeled by a thin spherical shell accreting the superquintessence fluid – two different models are presented. Contrary to recent claims that the wormhole overtakes the expansion of the universe and engulfs it before the Big Rip is reached, it is found that the wormhole becomes asymptotic...
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A network consists sensors prone to various security threats. These nodes make a vulnerable denial-of-service attacks. One them wormhole attack that uses low latency link between two malicious and affects the routing paths entire network. This brutal as it resistant many cryptographi...
Networks using wormhole switching have traditionally relied upon deadlock avoidance strategies for the design of deadlock-free routing algorithms. More recently, deadlock recovery strategies have begun to gain acceptance. In particular, progressive deadlock recovery techniques are very attractive because they allocate a few dedicated resources to quickly deliver deadlocked packets, instead of k...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید