A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security over Wormhole Attack in VANET Network System
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network ...
In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms. ...
In any case, such framework endures from quality of service degradation for security applications brought on by the direct congestion in scenarios with high vehicle density. ...
doi:10.23956/ijarcsse.v7i8.50
fatcat:64cjngqopncqpmlsi6svlftfau
A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks
2022
International Journal of Information Systems and Informatics
degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery. ...
The aim of this research paper is in the direction of Network security optimization. ...
this research is to optimize networks security apparatus in order to guard against the routing paths of different packets thereby securing the packets from malicious attacks. ...
doi:10.47747/ijisi.v2i4.581
fatcat:46dtnohqrvdilm25idz3nftxeq
Low-Latency Multichannel Wireless Mesh Networks
2007
2007 16th International Conference on Computer Communications and Networks
But optimal performance improvement eludes wireless mesh network designers because of differences between the wired/optical and wireless environments in the provision of non-interfering unidirectional ...
This resulted in the development of Asynchronous Transfer Mode (ATM) and Multi-Protocol Label Switching (MPLS) technologies. ...
, quality of service, traffic engineering and resource reservation protocols. ...
doi:10.1109/icccn.2007.4317962
dblp:conf/icccn/McTasneyGS07
fatcat:flrwp5allzdxbipwafocv4brom
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks
2005
Proceedings of the 4th ACM workshop on Wireless security - WiSe '05
of ground sensor networks. ...
delivery services. by both diffusion and advection. ...
We also thank all anonymous reviewers who made a number of constructive suggestions. ...
doi:10.1145/1080793.1080808
dblp:conf/ws/KongJWGBB05
fatcat:xg3ibuisrzbcbo2aqtxhpwxkr4
Wormhole IP over (connectionless) ATM
2001
IEEE/ACM Transactions on Networking
High-speed switches and routers internally operate using fixed-size cells or segments; variable-size packets are segmented and later reassembled. ...
Index Terms--Connectionless ATM, gigabit router, IP over ATM, routing filter, wormhole IP, wormhole routing. ...
Quality of Service and Multicasting In a wormhole IP over ATM network, quality of service (QoS) guarantees can be provided in a number of ways. ...
doi:10.1109/90.958332
fatcat:gu7dolm3nnea7ov3u4f5j6qpnq
DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
2021
HERALD OF SCIENCE OF S SEIFULLIN KAZAKH AGRO TECHNICAL UNIVERSITY
The detection method is based on the removal of the edges of the wormhole and causes significant changes in the length of the shortest paths between network nodes.The accuracy of the proposed algorithm ...
This article provides an overview of wormhole attack detection methods in WSN, as well as a new optimized method for detecting this attack. ...
A wormhole using a high quality / out-of-band channel [3] , [4] , [17] In this mode, a wormhole attack is launched using high-quality single-span out-of-band communication (called a tunnel) between ...
doi:10.51452/kazatu.2020.4(107).130
fatcat:bgs7yk6jcjdofjkfk6y6v7or24
Review Paper on Wormhole Attack
2015
International Journal of Computer Applications
In this paper we review WSN concept and Wormhole Attack. Then we discuss classification of wormhole Attack and also mention few of the initiatives to detect the Wormhole Attack. ...
A Wireless Networks are more accessible to different types of attack than wired Network. ...
Routing protocols that uses hop count for path selector are particularly susceptible to encapsulation-based wormhole attack (Figure 6 )
Wormhole using High-Quality or Out-of-Band Channel In this, attacker ...
doi:10.5120/ijca2015907529
fatcat:2laykjehfnhrva4lpeaecnib2y
A study of multistage interconnection networks operating with wormhole routing and equipped with multi-lane storage
[article]
2020
arXiv
pre-print
In contrast to other existing networks, this new architecture operates via wormhole routing using a multi-lane equivalent-weighted fair queuing system. ...
The rationale behind this innovative scheme is to introduce a more efficient network technology, thus providing a better quality of service (i.e. streaming media vs. file transfer). ...
This work In order to provide high quality of service (QoS) for today's high-speed networks, a new MIN is proposed that uses the wormhole routing method. ...
arXiv:2007.02550v1
fatcat:6p2hbzwjqzgr5bswpibfcas23m
Guest Editorial
1995
Journal of High Speed Networks
Some of the best papers not included here, will therefore be published in future regular issues of the Journal of High Speed Networks. ...
This special issue of the Journal of High Speed Networks is dedicated to Optical Networks. Its goal is to present the state-of-the-art of the emerging practical solutions to optical networking. ...
Gabriagues et al. describes an high performance ATM photonic switching matrix consisting of an all-optical self-routing network electrically controlled, developed under the support of the Commission of ...
doi:10.3233/jhs-1995-4401
fatcat:xeejyr4ouvegtprfyiimxeo3j4
Survey of wormhole attack in wireless sensor networks
2021
Computer Science and Information Technologies
There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. ...
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. ...
In this method it can wormhole attacks with high quality of accuracy. In [52] , the authors propose the security emerges as a centrally in MANET. ...
doi:10.11591/csit.v2i1.p33-42
fatcat:kszwmit7ozashbstyc2xwrrqfi
Securing the Integrated UMTS and WLAN Ad Hoc Networks for CBR Streaming Traffic against Wormhole Attack
2016
International Journal of Computing and Network Technology
This paper analyzes and compares performance of all security schemes on the basis of Quality of Service (QoS) metrics in integrated network for CBR video streaming traffic under WHA. ...
A suitable secure multipath routing protocol is required to protect against wormhole attack to defend untrusted infrastructure of the integrated networks. ...
In the NGNs, UMTS provides ubiquitous mobility and WLAN offers high speed data services. ...
doi:10.12785/ijcnt/040301
fatcat:zuoa6bnnrneb3egfm7ae3ndcfa
A Survey on Black Hole Attack in MANET
[chapter]
2016
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing
Black hole attack is a serious security problem to be solved for successful delivery of packets in mobile adhoc network. ...
This paper deals with the presentation of Black hole attack in MANET. Various previous techniques have been discussed in these papers that were used to prevent black hole attack. ...
Ease of implementation high quality of solutions, computational efficiency and speed of convergence are strengths of PSO. ...
doi:10.1007/978-81-322-2638-3_105
fatcat:cprmrlj4nfe25b7kg5ip57n6m4
FM-QoS
1997
Proceedings of the 1997 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '97
The transitive effects of such blockage can be catastrophic for quality of service. An example of such packet blockage is shown in Figure 1 . ...
However, wormhole routing makes predictable performance difficult because the "stop in place" flow control protocol induces network blocking. ...
Andrew Chien is supported in part by NSF Young Investigator Award CCR-94-57809. ...
doi:10.1145/509593.509595
dblp:conf/sc/ConnellyC97
fatcat:2e4wthg7n5hlfehgb3xn2ylfiu
A router architecture for flexible routing and switching in multihop point-to-point networks
1999
IEEE Transactions on Parallel and Distributed Systems
These diverse characteristics affect the performance and suitability of particular routing and switching policies in multihop point-to-point networks. ...
In addition, a flexible router can support several applications or traffic types simultaneously, enabling better support of applications with multiple traffic classes. ...
ACKNOWLEDGMENTS The work reported in this paper was supported in part by the U.S. National Science Foundation under grant MIP-9203895 and by the KOSEF under the postdoctoral fellowship. ...
doi:10.1109/71.744841
fatcat:dtrg2awoabhydnhqwjjezjvexa
Efficient Link Capacity and QoS Design for Network-on-Chip
2006
Proceedings of the Design Automation & Test in Europe Conference
The goal of the link capacity design process is to minimize the network cost (in terms of area and power) while maintaining the required quality of service (QoS), defined in terms of acceptable packet ...
Communication resource costs are minimized under Quality-of-Service timing constraints. ...
The concept of Network on a Chip (NoC) (introduced in [1] , [2] ) suggests that different modules service (QoS) of different inter-module traffic types. ...
doi:10.1109/date.2006.243951
dblp:conf/date/GuzWBCGK06
fatcat:sv2vdjhq5ve25hrhlquxdmovte
« Previous
Showing results 1 — 15 out of 1,080 results