نتایج جستجو برای: wormhole tunnel

تعداد نتایج: 37770  

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Honglong Chen Wei Lou Xice Sun Zhi Wang

Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the ...

2008
K A Rahman

We provide a prescription of real feasible sources that supply fuel to construct a traversable wormhole. A class of exact solutions for Einstein-Maxwell field equations describing wormhole with an anisotropic matter distribution has been presented. The anisotropy plays a crucial role for the existence of the spacetime comprising wormhole geometry.

2008
F. SCHEIN

We construct a static axisymmetric wormhole from the gravitational field of two Schwarzschild particles which are kept in equilibrium by strings (ropes) extending to infinity. The wormhole is obtained by matching two three-dimensional timelike surfaces surrounding each of the particles and thus spacetime becomes non-simply connected. Although the matching will not be exact in general it is poss...

2001
Sung-Won Kim Hyunjoo Lee

In this paper, the backreaction to the traversable Lorentzian wormhole spacetime by the scalar field or electric charge is considered to find the exact solutions. The charges play the role of the additional matter to the static wormhole which is already constructed by the exotic matter. The stability conditions for the wormhole with scalar field and electric charge are found from the positivene...

1998
Ayse Yasemin Seydim

In order to offer low communication latency and reduced buffer requirements, wormhole routing has been used in almost all new generation parallel computers. It has been a powerful switching technique where its communication latency is distance insensitive. On the other hand, deadlock avoidance is the most critical issue in wormhole networks. If deadlock handling is not considered, wormhole rout...

2008
Chonho Lee Junichi Suzuki J. Suzuki

This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the firs...

Journal: :CoRR 2009
Debdutta Barman Roy Rituparna Chaki Nabendu Chaki

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is ...

2016
Mohammad Nurul Afsar Shaon Ken Ferens

The Wormhole attack is a critical and challenging security threat for wireless sensor networks (WSNs). Although launching a wormhole attack is a relatively trivial task for the attacker, detecting it from an infected WSN is a tough job, because it can be launched from a compromised legitimate node. In recent years, signal processing methods, like the short term Fourier transform (STFT) and wave...

Journal: :IEEE Wireless Commun. 2010
Yanzhi Ren Mooi Choo Chuah Jie Yang Yingying Chen

The Delay Tolerant Networks (DTNs) are especially useful in providing mission critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which replays them locally into the network. Wormhole attacks are a severe threat to ...

M. Ahmadi S. M. Jameii

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید