نتایج جستجو برای: wormhole detection scheme
تعداد نتایج: 774238 فیلتر نتایج به سال:
In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is ...
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which ...
As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly suscep...
The proper management of wireless mesh network is a challenging task due to the mobility of node and velocity of node. All devices work in open channel area due to this security is very challenging task. Because due to mobility and open channel area possibility of threats and attacks are very high. On the basis of related work we found data wormhole attack is a serious attack in the environment...
Deadlock detection and recovery-based routing schemes for wormhole networks have gained attraction because unlike deadlock avoidance-based schemes, they do not restrict routing adaptability. In order to alleviate the overhead of running a recovery procedure, the studies on deadlock detection have focused on the accuracy of deadlock detection, trying to reduce the number of false detections. Thi...
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, prop...
Regarding the static form of Maxwell’s equations in wormhole background geometry, we obtain a generalised form of Laplace’s equation. Because of peculiar geometry of the throat, lines of force that enter the wormhole at one mouth and emerge from the other, initially converge and then diverge. So, for a remote observer the wormhole can act as a charge distribution that modifies the potential, ...
The one-to-all broadcast is the most primary operation in a multicomputer network. In this paper, we study this problem in a wormhole-routed 3D torus which provides the dimension-ordered routing and the all-port communication capability. We propose an efficient scheme to utilize the distance-insensitive characteristic of wormhole routing. The scheme requires at most 4 steps more than the optima...
This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes ar...
In-band wormhole attacks undermine routing by attracting network traffic that otherwise may have bypassed the attackers via alternate, lower-cost routes. The result gives the attackers control over the attracted traffic, allowing them to modify, delay, redirect, eavesdrop, or drop the traffic. In this paper we expand upon the gravitational analysis technique, first presented in [KSG06], for eva...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید