نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

1997
David Hochberg Matt Visser

Traversable wormholes have traditionally been viewed as intrinsically topological entities in some multiply connected spacetime. Here, we show that topology is too limited a tool to accurately characterize a generic traversable wormhole: in general one needs geometric information to detect the presence of a wormhole, or more precisely to locate the wormhole throat. For an arbitrary static space...

2013
Huang Wen

Ad hoc networks are made of a group of portable terminals with wireless transmitter as multi-hops provisional autonomy system. Ad hoc networks are very easy to be attacked by various kinds of network attacks, as the limited resources, dynamic topology and open communication channel and so on. Wormhole attack is an internal attack means against routing protocols in the Ad hoc networks,The resear...

2007
Akhilesh Kumar Laxmi N. Bhuyan Ravi Iyer

In this paper, performance of multistage interconnection network with wormhole routing and packet switching has been evaluated for cache-coherent shared-memory multiprocessors. The traac in cache-coherent systems is characterized by traac bursts, one-to-many and many-to-one traac, and small xed length messages. The evaluation is based on execution-driven simulation using various applications. T...

2015
Kesav Unnithan Lakshmi Devi

Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, ja...

2003
Nuno Miguel Neves

This paper presents a novel architecture that supports the reliability and dependability of an Intrusion Detection System (IDS). It also provides timeliness guarantees that are shown to be fundamental in a trusted IDS. The architecture is also distributed, in the sense that the several components communicate and exchange status between them in a secure way. It uses the wormhole principle as a m...

2003
A. L. Choudhury

We use the Gu-Huang model for a special case when the universe is seven dimensional. In the core of the extra dimension we place a modified Gidding-Strominger wormhole. This wormhole is separated by a thin wall from the extra dimensional space. The wormhole content is assumed to satisfy the adiabatic gas law. The wormhole pressure penetrates into the extra dimension. We then solve the Einstein ...

1998
Matt Visser

It is by now apparent that topology is too crude a tool to accurately characterize a generic traversable wormhole. In two earlier papers we developed a complete characterization of generic but static traversable wormholes, and in the present paper extend the discussion to arbitrary time-dependent (dynamical) wormholes. A local definition of wormhole throat, free from assumptions about asymptoti...

بهرام نصر اصفهانی, ,

  Time-dependent wormhole solution of the BD theory in an anisotropic radiation background is presented. It is also found that the BD scalar field depends only on time. This time dependency is in power-law form. It is shown that the wormhole geometry is valid for ω ≥ -3/2, and for any arbitrary positive values of . The GR limit of our solution is obtained for ω=0 , not for ω→∞ . Though the BD f...

2014
Neha Sahu Deepak Singh Tomar Neelam Pathak

In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید