نتایج جستجو برای: wormhole detection scheme

تعداد نتایج: 774238  

2002
Nen-Chung Wang Chih-Ping Chu

Multicast is an important collective communication operation on multicomputer systems, in which the same message is delivered from a source node to an arbitrary number of destination nodes. The star graph interconnection network has been recognized as an attractive alternative to the popular hypercube network. In our previous work on wormhole star graph networks routing, we proposed a path-base...

Journal: :Journal of Systems Architecture 2000
Tzung-Shi Chen Chih-Yung Chang Jang-Ping Sheu

The capability of multidestination wormhole allows a message to be propagated along any valid path in a wormholerouted network conforming to the underlying base routing scheme. The multicast on the path-based routing model is highly dependent on the spatial locality of destinations participating in multicasting. In this paper, we propose two proximity grouping schemes for ecient multicast in w...

2015
P SUBHASH S RAMACHANDRAM

The main motivation of an attacker is to convince two far away nodes as neighbor nodes using wormhole attack easily without the knowledge of cryptographic primitives. Thus, it can significantly degrade the performance of Wireless Mesh Networks (WMNs). Secure neighbor discovery is a fundamental requirement of network nodes to ensure secure data communication. An adversary that bypass neighbor di...

Journal: :IJSN 2008
Weichao Wang Jiejun Kong Bharat K. Bhargava Mario Gerla

We propose a distributed mechanism, Dis-VoW, to detect wormhole attacks in under-water sensor networks. In Dis-VoW, every sensor reconstructs local network layout using multi-dimensional scaling. It detects the wormholes by visualising the distortions in edge lengths and angles among neighbouring sensors. The contributions include: • Dis-VoW does not depend on any special hardware • it provides...

2014
K.Aathi Dharshini Thirumangai Alwar

Communication in mobile Ad hoc networks is completed via multi-hop ways. Owing to the distributed specification and restricted resource of nodes, MANET is a lot prone to wormhole attacks i.e. wormhole attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus, so as to discover wormholes, totally different techniques are in use. In all those techniques fi...

2014
Priti Gupta

Wireless Mesh Networking is an emerging technology in order to provide a possibility to build a network that can grow in terms of coverage to offer service access (i.e. internet access) for a large number of people with different needs. Security has become the main concern to provide safe communication between different mesh nodes. The aim of this research is to study various security mechanism...

2011
A. VANI D. Sreenivasa Rao

The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of high...

2014
Rajesh K Shukla

--------------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------------In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open entrusted environment with little security a...

2013
Vincent Koo

Preventing Collaborative Wormhole Attacks on AODV-Based Mobile Ad Hoc Networks c ©Vincent Koo, 2012 Master of Science Computer Science Ryerson University Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly...

2007
Jwo-An Lin Yung-Chou Tsai Yarsun Hsu

With the improvement of chip manufacture process, a single chip may contain many processor cores and functional units. These cores and functional units communicate with each other through an on-chip interconnection network. Therefore, a key issue in the design of multi-core chip is how to construct a low latency high bandwidth on-chip interconnect. In this paper, a cycle stealing buffer and a p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید