نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

1998
Byungjae Kim Jong Kim Sung Je Hong Sunggu Lee

In this paper, we propose a real-time communication scheme that can be used in general point-to-point real-time multicomputer systems with wormhole switching. Real-time communication should satisfy the two requirements of predictability and priority handling. Since traditional wormhole switching does not support priority handling, which is essential in real-time computing, flit-level preemption...

Journal: :Computer Networks 2007
Issa M. Khalil Saurabh Bagchi Ness B. Shroff

In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node far away, which replays it locally. This...

2017
Jonny Karlsson

The Internet is experiencing an evolution towards a ubiquitous network paradigm, via the so-called internet-of-things (IoT), where small wireless computing devices like sensors and actuators are integrated into daily activities. Simultaneously, infrastructure-less systems such as mobile ad hoc networks (MANET) are gaining popularity since they provide the possibility for devices in wireless sen...

Journal: :IEEE Trans. Computers 1994
Jong Kim Chita R. Das

We present an analytical model for the performance evaluation of hypercube computers. This analysis is aimed at modeling a deadlock-free wormhole routing scheme prevalent on second generation hypercube systems. Probability of blocking and average message delay are the two performance measures discussed here. We start with the communication t r a c to find the probability of blocking. The traffi...

2007
Sharad Sundaresan Riccardo Bettati

Wormhole networks provide a very-high-speed communication medium that is well suited for a large number of bandwidth demanding applications. Unfortunately, the lack of buuering in the switches causes blocked packets to transiently monopolize arbitrary large portions of the network, thus making it diicult to give real-time guarantees when connections contend for communication links. We present a...

2015
Akansha Shrivastava Rajni Dubey

Security is the one of the major issue that exists in Mobile Ad hoc network. Mobile Ad hoc network is infrastructure less network so it is vulnerable to several security attacks that are on different layers. Wormhole attack is one of the serious routing attack on network layer. This paper focuses on the wormhole attack, its classification and the modes by which they are launched. This paper sum...

2015
Shraddha S. Mahajan

As Mobile Ad-hoc Network (MANET) doesn’t require pre-existing infrastructure, thus every node is active in data transmission and reception. In MANET various attacks are created by unauthorized transmitter in the network, which may affects on the performance of the network. Wormhole attack is created by collaborative attackers. So confrontation is take place between discoveries and dislodges thi...

2012
S. Sharmila G. Umamaheswari David Wagner Y. Hu A. Perring D. B. Johnson Majid Khabbazian Vijay K Bhargava Zhibin Zhao Bo Wei Xiaomei Dong Lan Yao Fuxiang Gao Dezun Dong Mo Li Yunhao Liu Xiang-Yang Li Xiangke Liao

The open nature of wireless communication channels, lack of infrastructure and fast deployment practices make vulnerable to wide range of routing attacks. One of the most popular attacks is wormhole attack. The transmission time based detection of wormhole attack is proposed and is simulated in Network simulator (ns-2). The detection accuracy of the network is analyzed. The proposed method does...

Journal: :International Journal of Security and Its Applications 2016

2009
Zaw Tun Aung Htein Maw

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید