نتایج جستجو برای: wormhole tunnel

تعداد نتایج: 37770  

1993
Kai-Ming Lee

The electric charge of a wormhole mouth and the magnetic flux “linked” by the wormhole are non-commuting observables, and so cannot be simultaneously diagonalized. We use this observation to resolve some puzzles in wormhole electrodynamics and chromodynamics. Specifically, we analyze the color electric field that results when a colored object traverses a wormhole, and we discuss the measurement...

2009
Rennie de Graaf Islam Hegazy Jeffrey Horton Reihaneh Safavi-Naini

Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distribute...

2008
N. J. Sun

On this paper we consider the classical wormhole solution of the Born-Infeld scalar field. The corresponding classical wormhole solution can be obtained analytically for both very small and large φ̇. At the extreme limits of small φ̇ the wormhole solution has the same format as one obtained by Giddings and Strominger[10]. At the extreme limits of large φ̇ the wormhole solution is a new one. The wo...

2004
Lingxuan Hu David Evans

Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. To date, no general defenses against wormhole attacks have been proposed. This paper presents an analysis of wormhole attacks and proposes a countermeasure using directional antennas. We present a cooperative protocol whereby nodes share directional information to preven...

2005
V. Faraoni W. Israel

The time evolution of a wormhole in a Friedmann universe approaching the Big Rip is studied. The wormhole is modeled by a thin spherical shell accreting the superquintessence fluid – two different models are presented. Contrary to recent claims that the wormhole overtakes the expansion of the universe and engulfs it before the Big Rip is reached, it is found that the wormhole becomes asymptotic...

2006
Kirill A. Bronnikov Alexei A. Starobinsky

It is proved that no wormholes can be formed in viable scalar-tensor models of dark energy admitting its phantom-like (w < −1) behaviour in cosmology, even in the presence of electric or magnetic fields, if the non-minimal coupling function f(Φ) is everywhere positive and the scalar field Φ itself is not a ghost. Some special static, spherically symmetric wormhole solutions may exist if f(Φ) is...

2007
Yurong Xu Guanling Chen James Ford Fillia Makedon

This paper proposes a distributed wormhole detection algorithm for wireless sensor networks, a potential technology for infrastructures of many applications. Currently, most sensor networks assume they will be deployed in a benign environment; however, when a sensor network is deployed in some hostile environment, attacks (especially those like wormhole attacks that don’t need to capture the ke...

2005
S Krasnikov

Suppose, the Universe comes into existence (as classical spacetime) already with an empty spherically symmetric macroscopic wormhole present in it. Classically the wormhole would evolve into a part of the Schwarzschild space and thus would not allow any signal to traverse it. I consider semiclassical corrections to that picture and build a model of an evaporating wormhole. The model is based on...

2013
Ismail Hababeh

Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniq...

Journal: :CoRR 2009
Marianne Azer Sherif El-Kassas Magdy S. El-Soudani

In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them. In the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید