نتایج جستجو برای: wormhole detection scheme
تعداد نتایج: 774238 فیلتر نتایج به سال:
In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) ...
7 tions are proposed for wormhole attacks in sensor networks, but only a few of 8 them take mobility of sensor nodes into account. We propose a distributed 9 wormhole detection scheme for mobile wireless sensor networks in which mobility 10 of sensor nodes is utilized to estimate two network features (i.e. network node 11 density, standard deviation in network node density) through using neighb...
The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired networ...
As sensor-driven applications become progressively more integrated into our lives; issues linked to sensor privacy will become increasingly important. In wireless sensor networks, adversaries can make use of the traffic information for locating the monitored objects. Network coding has been shown to be an efficient approach to improve the wireless system performance. In a wormhole attack, the a...
Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over wireless sensor networks (WSNs). Wormhole are characterized as distributed passive that can destabilize or disable WSNs. The nature these makes them enormously challenging to detect. main objective find all possible ways in which how network’s broadcasting character transmission medium allows attacke...
The main Importance of Research paper is to propose a new algorithm for the detection of wormhole Attack in the WSNs. Wormhole Attack is the severe attack on WSN routing protocols. Two malicious nodes create an illusion that they are very close to each other by setting up low latency link(wormhole tunnel), retrieve data packets on one part and transmit it to another part of the network via that...
Deadlock free routing of messages is a challenge for the performance of directly connected network systems. Communication among the nodes of a directly connected multicomputer system is via message exchange. The wormhole routing is perceived as the best switching technique in directly connected systems. The technique suffers the challenges like deadlock avoidance. Deadlock recovery faces cost o...
Various routing attacks for single-path routing have been identified for wireless ad hoc networks and the corresponding counter measures have been proposed in the literature. However, the effects of routing attacks on multi-path routing have not been addressed. In this paper, the performance of multi-path routing under wormhole attack is studied in detail. The results show that multi-path routi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید