نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

Journal: :CoRR 2009
Debdutta Barman Roy Rituparna Chaki Nabendu Chaki

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is ...

2007
Yurong Xu Guanling Chen James Ford Fillia Makedon

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which ...

2011
E. Poornima Shoba Bindhu

As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly suscep...

2012
Akshita Rana Deepak

The proper management of wireless mesh network is a challenging task due to the mobility of node and velocity of node. All devices work in open channel area due to this security is very challenging task. Because due to mobility and open channel area possibility of threats and attacks are very high. On the basis of related work we found data wormhole attack is a serious attack in the environment...

Journal: :J. Inf. Sci. Eng. 2009
Soojung Lee

Deadlock detection and recovery-based routing schemes for wormhole networks have gained attraction because unlike deadlock avoidance-based schemes, they do not restrict routing adaptability. In order to alleviate the overhead of running a recovery procedure, the studies on deadlock detection have focused on the accuracy of deadlock detection, trying to reduce the number of false detections. Thi...

2018
Khattab M Ali Alheeti Muzhir Shaban Al-Ani Klaus McDonald-Maier

Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, prop...

بهرام نصراصفهانی, ,

  Regarding the static form of Maxwell’s equations in wormhole background geometry, we obtain a generalised form of Laplace’s equation. Because of peculiar geometry of the throat, lines of force that enter the wormhole at one mouth and emerge from the other, initially converge and then diverge. So, for a remote observer the wormhole can act as a charge distribution that modifies the potential, ...

1998
Yu-Chee Tseng San-Yuan Wang

The one-to-all broadcast is the most primary operation in a multicomputer network. In this paper, we study this problem in a wormhole-routed 3D torus which provides the dimension-ordered routing and the all-port communication capability. We propose an efficient scheme to utilize the distance-insensitive characteristic of wormhole routing. The scheme requires at most 4 steps more than the optima...

2012
He Ronghui Ma Guoqing Wang Chunlei Fang Lan

This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes ar...

2008
Richard Gopaul Peter Kruus Dan Sterne Brian Rivera

In-band wormhole attacks undermine routing by attracting network traffic that otherwise may have bypassed the attackers via alternate, lower-cost routes. The result gives the attackers control over the attracted traffic, allowing them to modify, delay, redirect, eavesdrop, or drop the traffic. In this paper we expand upon the gravitational analysis technique, first presented in [KSG06], for eva...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید