نتایج جستجو برای: wormhole tunnel
تعداد نتایج: 37770 فیلتر نتایج به سال:
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the ...
We provide a prescription of real feasible sources that supply fuel to construct a traversable wormhole. A class of exact solutions for Einstein-Maxwell field equations describing wormhole with an anisotropic matter distribution has been presented. The anisotropy plays a crucial role for the existence of the spacetime comprising wormhole geometry.
We construct a static axisymmetric wormhole from the gravitational field of two Schwarzschild particles which are kept in equilibrium by strings (ropes) extending to infinity. The wormhole is obtained by matching two three-dimensional timelike surfaces surrounding each of the particles and thus spacetime becomes non-simply connected. Although the matching will not be exact in general it is poss...
In this paper, the backreaction to the traversable Lorentzian wormhole spacetime by the scalar field or electric charge is considered to find the exact solutions. The charges play the role of the additional matter to the static wormhole which is already constructed by the exotic matter. The stability conditions for the wormhole with scalar field and electric charge are found from the positivene...
In order to offer low communication latency and reduced buffer requirements, wormhole routing has been used in almost all new generation parallel computers. It has been a powerful switching technique where its communication latency is distance insensitive. On the other hand, deadlock avoidance is the most critical issue in wormhole networks. If deadlock handling is not considered, wormhole rout...
This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the firs...
In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is ...
The Wormhole attack is a critical and challenging security threat for wireless sensor networks (WSNs). Although launching a wormhole attack is a relatively trivial task for the attacker, detecting it from an infected WSN is a tough job, because it can be launched from a compromised legitimate node. In recent years, signal processing methods, like the short term Fourier transform (STFT) and wave...
The Delay Tolerant Networks (DTNs) are especially useful in providing mission critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which replays them locally into the network. Wormhole attacks are a severe threat to ...
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید