نتایج جستجو برای: wormhole detection scheme
تعداد نتایج: 774238 فیلتر نتایج به سال:
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbor relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. We propose a classification of the attacks according to the format of the wormholes. It establishes a basis on which the detection capability of the approaches can be ide...
The Delay Tolerant Networks (DTNs) are especially useful in providing mission critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which replays them locally into the network. Wormhole attacks are a severe threat to ...
Efficient Multicast in Wormhole-Routed 2D Mesh/Torus Multicomputers: A Network-Partitioning Approach
In this paper, a network-partitioning scheme for multicasting on wormhole-routed networks is proposed. To multicast a message, the scheme works in three phases. First, a number of data-distributing networks (DDNs), which can work independently, are constructed. Then the message is evenly divided into sub-messages each being sent to a representative node in one DDN. Second, the sub-messages are ...
Wormhole networks provide a very-high-speed communication medium that is well suited for a large number of bandwidth demanding applications. Unfortunately, the lack of buffering in the switches causes blocked packets to transiently monopolize arbitrary large portions of the network, thus making it difficult to give real-time guarantees when connections contend for communication links. We presen...
Neighbor discovery is an important part of many protocols for wireless adhoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade communications. In this article we present Mobil...
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially des...
Wireless sensor networks can be deployed in inhospitable terrains or in hostile environments to provide continuous monitoring and processing capabilities. Due to the wireless and distributed nature, security is very crucial issue in wireless sensor network. Security comes from attacks. Detecting wormhole attack is very hard compared to other attacks because it uses private, out-of-band channel ...
The capability of multidestination wormhole allows a message to be propagated along any valid path in a wormholerouted network conforming to the underlying base routing scheme. The multicast on the path-based routing model is highly dependent on the spatial locality of destinations participating in multicasting. In this paper, we propose two proximity grouping schemes for ecient multicast in w...
Wireless networking relies on a fundamental building block, neighbor discovery (ND). However, the nature of wireless communications makes attacks against ND easy: an adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes they communicate directly. Such attacks can compromise the overlying protocols and applications. Proposals in the literature ...
Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics such as dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. Any node in mobile ad hoc networks operates not only as end terminal but both as an intermediate router and client. In this way, multi-hop communication occurs in MANETs and thu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید