نتایج جستجو برای: Wormhole Tunnel

تعداد نتایج: 37770  

2011
Ahmad Heidari

Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...

2015
Gaurav Gupta

The main Importance of Research paper is to propose a new algorithm for the detection of wormhole Attack in the WSNs. Wormhole Attack is the severe attack on WSN routing protocols. Two malicious nodes create an illusion that they are very close to each other by setting up low latency link(wormhole tunnel), retrieve data packets on one part and transmit it to another part of the network via that...

Journal: :Int. J. Communication Systems 2014
King Sun Chan Mohammad Rafiqul Alam

Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks (MANET). In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormh...

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

2015
Garima Kadian Dinesh Singh Shaishav Shah Aanchal Jain Arun Raj Kumar Yih-Chun Hu Adrian Perrig David B. Johnson Hon Sun Chiu King-Shan Lui Phuong Van Tran Le Xuan Hung Young-Koo Lee Sungyoung Lee Heejo Lee Mohammad Rafiqul Alam

A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole A...

2014
RAJ SHREE R. A. KHAN

In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network, security is an important factor. It becomes more critical issue when we transmit important data between nodes. There are a lot of attacks available in wireless sensor network or mobile ad hoc network. In our paper we are going to discuss about a particularly devastating attack, known as the wormhole attack. ...

2014
Akansha Agrawal Amit Saxena

The wormhole attack is considered a serious threat to the security in multi-hop ad hoc networks. In wormhole attack, the attacker makes the tunnel from one end to another network, the nodes are in a different place at both ends of the tunnel believe are true neighbours and gets the conversation through the wormhole link . Unlike many other ad hoc routing attacks, worm hole attack cannot be prev...

2013
Gaurav Sharma Mehajabeen Fatima

Now these day multihop wireless Ad-hoc network suffer from number of security threat namely wormhole attack. Wormhole attacks make an tunnel that attracted all the communication over the network in order either scan message over packet , drop the packet or for unwanted consumption of battery power of Adhoc network. In this paper a wormhole detection and prevention scheme has been proposed in or...

2014
Harleen Kaur Neetu Gupta

Wormhole attack can be destabilizes or disables wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network and forwards them with a less latency than the network links, and relays them to another point in the network. This paper describes the taxonomy of wormhole attack and presents the several scenarios of wormhole attacks. KeywordsWireles...

2013
Pratima Singh Ashish Srivastava Nitesh Gupta

In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threats because of its open entrusted environment, with little security arrangement, security over MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید