نتایج جستجو برای: wormhole tunnel
تعداد نتایج: 37770 فیلتر نتایج به سال:
As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly suscep...
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc and sensor network is the wormhole attack. It is a particularly severe attack on routing protocols for ad hoc networks in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at t...
'Mobile ad hoc network (MANET)' is an infrastructure less, self controlled wireless network it doesn't need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchang...
Regarding the static form of Maxwell’s equations in wormhole background geometry, we obtain a generalised form of Laplace’s equation. Because of peculiar geometry of the throat, lines of force that enter the wormhole at one mouth and emerge from the other, initially converge and then diverge. So, for a remote observer the wormhole can act as a charge distribution that modifies the potential, ...
Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructureless network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network. These colluding nodes create an illusi...
Secure neighbor discovery is an important element in wireless networking. Several important network functionalities such as routing and localization basically rely on correct neighbor discovery which is the problem concerned in this work. A wormhole attacker can easily tunnel and replay packets from one area of the wireless network to another one, to make the nodes in such typically far awar ar...
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically insecure environment and, as a result, are vulnerable to capture and compromise. In addition, the nature of the wireless communication medium restricts enforcement of rigourous node memberships and so a number of maliciou...
We propose wormholes solutions by assuming space dependent equation of state parameter. Our models show that the existence of wormholes is supported by arbitrary small quantities of averaged null energy condition (ANEC) violating phantom energy characterized by variable equation state parameter. A Wormhole is a 'tunnel' through curved spacetime, connecting two widely separated regions of our Un...
We propose wormholes solutions by assuming space dependent equation of state parameter. Our models show that the existence of wormholes is supported by phantom energy. Here the phantom energy is characterized by variable equation state parameter. This averaged null energy condition (ANEC) violating phantom energy can be reduced as desired. A Wormhole is a 'tunnel' through curved spacetime, conn...
Mobile Ad-hoc network is additionally a network that is self-organized and adaptive in nature. As a results of lack of centralized infrastructure several security problems are arises and malicious activity performed by offender. Here we've got an inclination to tend to denote specific attack referred to as wormhole attack , throughout that the degree offender with the help of malicious node to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید