نتایج جستجو برای: wormhole detection scheme
تعداد نتایج: 774238 فیلتر نتایج به سال:
Received: 23 June 2006 Revised: 31 July 2006 Accepted: 21 October 2006 Online publication date: 25 January 2007 Abstract Wormhole attacks in wireless networks can severely deteriorate network performance and compromise security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monito...
This paper presents a new approach to minimize node contention while performing multiple multicast/broadcast on wormhole k-ary n-cube networks with overlapped destination sets. The existing multicast algorithms in the literature deliver poor performance under multiple multicast because these algorithms have been designed with only single multicast in mind. The new algorithms introduced in this ...
In this paper, a network-partitioning approach for one-to-all broadcasting on wormhole-routed networks is proposed. To broadcast a message, the scheme works in three phases. First, a number of data-distributing networks (DDNs), which can work independently, are constructed. Then the message is evenly divided into sub-messages each being sent to a representative node in one DDN. Second, the sub-...
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. We first propose a centralized algorithm to detect wormholes and show its correctness rigorously. Fo...
In this paper, we propose two mechanisms for wormhole detection in wireless sensor networks. The proposed mechanisms are based on hypothesis testing and they provide probabilistic results. The first mechanism, called the Neighbor Number Test (NNT), detects the increase in the number of the neighbors of the sensors, which is due to the new links created by the wormhole in the network. The second...
This paper proposes a novel concept of multidestination worm mechanism which allows a message to be propagated in a wormhole network conforming to the underlying base routing scheme (ecube, planar, turn, or fully adaptive). Using this model, any source has potential to deliver a message to multiple destinations in any valid path in the system conforming to the base routing scheme while encounte...
Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging adversarial modules that tremendously affect the communica...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید