نتایج جستجو برای: wormhole tunnel

تعداد نتایج: 37770  

2015
Jordi Prat-Camps Carles Navau Alvaro Sanchez

Wormholes are fascinating cosmological objects that can connect two distant regions of the universe. Because of their intriguing nature, constructing a wormhole in a lab seems a formidable task. A theoretical proposal by Greenleaf et al. presented a strategy to build a wormhole for electromagnetic waves. Based on metamaterials, it could allow electromagnetic wave propagation between two points ...

2013
T. M. Santhi Syed Umar V. Sushma

In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. Thes...

2014
Rajesh K Shukla

--------------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------------In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open entrusted environment with little security a...

2013
Bhavneet Kaur Sandeep Singh Kang

Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The latter are equipped with sensing, computation, and wireless communications capabilities, and have very limited resources. Wireless sensor networks have been widely used in remote areas, military scenarios, sensing motion applications, agriculture solutions ...

2016
Shalki Naresh

Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...

2013
Nagendra Kumar Shubham Omar Sandeep Saxena

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired networ...

1999
L. A. Anchordoqui M. L. Trobo H. Vucetich F. Zyserman

A traversable wormhole solution of general scalar–tensor field equations is presented. We have shown, after a numerical analysis for the behavior of the scalar field of Brans-Dicke theory, that the solution is completely singularity– free. Furthermore, the analysis of more general scalar field dependent coupling constants indicates that the gravitational memory phenomenon may play an important ...

2013
Sweety Goyal Harish Rohil

In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make...

2015
Neha Sahu Deepak Singh Tomar Neelam Pathak

In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm h...

2014
Neha Sahu Deepak Singh Tomar Neelam Pathak

In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید