1,080 Hits in 8.2 sec

Security over Wormhole Attack in VANET Network System

Shahuraje Nikam, Anshul Sarawagi
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network  ...  In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms.  ...  In any case, such framework endures from quality of service degradation for security applications brought on by the direct congestion in scenarios with high vehicle density.  ... 
doi:10.23956/ijarcsse.v7i8.50 fatcat:64cjngqopncqpmlsi6svlftfau

A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks

Imeh Umoren, Ekemini Okpongkpong, Ifreke Udoeka
2022 International Journal of Information Systems and Informatics  
degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery.  ...  The aim of this research paper is in the direction of Network security optimization.  ...  this research is to optimize networks security apparatus in order to guard against the routing paths of different packets thereby securing the packets from malicious attacks.  ... 
doi:10.47747/ijisi.v2i4.581 fatcat:46dtnohqrvdilm25idz3nftxeq

Low-Latency Multichannel Wireless Mesh Networks

Robert McTasney, Dirk Grunwald, Douglas Sicker
2007 2007 16th International Conference on Computer Communications and Networks  
But optimal performance improvement eludes wireless mesh network designers because of differences between the wired/optical and wireless environments in the provision of non-interfering unidirectional  ...  This resulted in the development of Asynchronous Transfer Mode (ATM) and Multi-Protocol Label Switching (MPLS) technologies.  ...  , quality of service, traffic engineering and resource reservation protocols.  ... 
doi:10.1109/icccn.2007.4317962 dblp:conf/icccn/McTasneyGS07 fatcat:flrwp5allzdxbipwafocv4brom

Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks

Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive Bagrodia, Bharat Bhargava
2005 Proceedings of the 4th ACM workshop on Wireless security - WiSe '05  
of ground sensor networks.  ...  delivery services. by both diffusion and advection.  ...  We also thank all anonymous reviewers who made a number of constructive suggestions.  ... 
doi:10.1145/1080793.1080808 dblp:conf/ws/KongJWGBB05 fatcat:xg3ibuisrzbcbo2aqtxhpwxkr4

Wormhole IP over (connectionless) ATM

M.G.H. Katevenis, Iakovos Mavroidis, G. Sapountzis, E. Kalyvianaki, Ioannis Mavroidis, G. Glykopoulos
2001 IEEE/ACM Transactions on Networking  
High-speed switches and routers internally operate using fixed-size cells or segments; variable-size packets are segmented and later reassembled.  ...  Index Terms--Connectionless ATM, gigabit router, IP over ATM, routing filter, wormhole IP, wormhole routing.  ...  Quality of Service and Multicasting In a wormhole IP over ATM network, quality of service (QoS) guarantees can be provided in a number of ways.  ... 
doi:10.1109/90.958332 fatcat:gu7dolm3nnea7ov3u4f5j6qpnq


Zhukabayeva T.K., Mardenov E.M.,PhD
The detection method is based on the removal of the edges of the wormhole and causes significant changes in the length of the shortest paths between network nodes.The accuracy of the proposed algorithm  ...  This article provides an overview of wormhole attack detection methods in WSN, as well as a new optimized method for detecting this attack.  ...  A wormhole using a high quality / out-of-band channel [3] , [4] , [17] In this mode, a wormhole attack is launched using high-quality single-span out-of-band communication (called a tunnel) between  ... 
doi:10.51452/kazatu.2020.4(107).130 fatcat:bgs7yk6jcjdofjkfk6y6v7or24

Review Paper on Wormhole Attack

Garima Kadian, Dinesh Singh
2015 International Journal of Computer Applications  
In this paper we review WSN concept and Wormhole Attack. Then we discuss classification of wormhole Attack and also mention few of the initiatives to detect the Wormhole Attack.  ...  A Wireless Networks are more accessible to different types of attack than wired Network.  ...  Routing protocols that uses hop count for path selector are particularly susceptible to encapsulation-based wormhole attack (Figure 6 ) Wormhole using High-Quality or Out-of-Band Channel In this, attacker  ... 
doi:10.5120/ijca2015907529 fatcat:2laykjehfnhrva4lpeaecnib2y

A study of multistage interconnection networks operating with wormhole routing and equipped with multi-lane storage [article]

Eleftherios Stergiou
2020 arXiv   pre-print
In contrast to other existing networks, this new architecture operates via wormhole routing using a multi-lane equivalent-weighted fair queuing system.  ...  The rationale behind this innovative scheme is to introduce a more efficient network technology, thus providing a better quality of service (i.e. streaming media vs. file transfer).  ...  This work In order to provide high quality of service (QoS) for today's high-speed networks, a new MIN is proposed that uses the wormhole routing method.  ... 
arXiv:2007.02550v1 fatcat:6p2hbzwjqzgr5bswpibfcas23m

Guest Editorial

Imrich Chlamtac, Andrea Fumagalli
1995 Journal of High Speed Networks  
Some of the best papers not included here, will therefore be published in future regular issues of the Journal of High Speed Networks.  ...  This special issue of the Journal of High Speed Networks is dedicated to Optical Networks. Its goal is to present the state-of-the-art of the emerging practical solutions to optical networking.  ...  Gabriagues et al. describes an high performance ATM photonic switching matrix consisting of an all-optical self-routing network electrically controlled, developed under the support of the Commission of  ... 
doi:10.3233/jhs-1995-4401 fatcat:xeejyr4ouvegtprfyiimxeo3j4

Survey of wormhole attack in wireless sensor networks

Umashankar Ghugar, Jayaram Pradhan
2021 Computer Science and Information Technologies  
There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe.  ...  From the last decade, a wireless sensor network (WSN) has a very important role over the networks.  ...  In this method it can wormhole attacks with high quality of accuracy. In [52] , the authors propose the security emerges as a centrally in MANET.  ... 
doi:10.11591/csit.v2i1.p33-42 fatcat:kszwmit7ozashbstyc2xwrrqfi

Securing the Integrated UMTS and WLAN Ad Hoc Networks for CBR Streaming Traffic against Wormhole Attack

Shashank Tripathi,et al.
2016 International Journal of Computing and Network Technology  
This paper analyzes and compares performance of all security schemes on the basis of Quality of Service (QoS) metrics in integrated network for CBR video streaming traffic under WHA.  ...  A suitable secure multipath routing protocol is required to protect against wormhole attack to defend untrusted infrastructure of the integrated networks.  ...  In the NGNs, UMTS provides ubiquitous mobility and WLAN offers high speed data services.  ... 
doi:10.12785/ijcnt/040301 fatcat:zuoa6bnnrneb3egfm7ae3ndcfa

A Survey on Black Hole Attack in MANET [chapter]

Shruti Singh, Abhishek Bajpai, Suryambika
2016 Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing  
Black hole attack is a serious security problem to be solved for successful delivery of packets in mobile adhoc network.  ...  This paper deals with the presentation of Black hole attack in MANET. Various previous techniques have been discussed in these papers that were used to prevent black hole attack.  ...  Ease of implementation high quality of solutions, computational efficiency and speed of convergence are strengths of PSO.  ... 
doi:10.1007/978-81-322-2638-3_105 fatcat:cprmrlj4nfe25b7kg5ip57n6m4


Kay Connelly, Andrew A. Chien
1997 Proceedings of the 1997 ACM/IEEE conference on Supercomputing (CDROM) - Supercomputing '97  
The transitive effects of such blockage can be catastrophic for quality of service. An example of such packet blockage is shown in Figure 1 .  ...  However, wormhole routing makes predictable performance difficult because the "stop in place" flow control protocol induces network blocking.  ...  Andrew Chien is supported in part by NSF Young Investigator Award CCR-94-57809.  ... 
doi:10.1145/509593.509595 dblp:conf/sc/ConnellyC97 fatcat:2e4wthg7n5hlfehgb3xn2ylfiu

A router architecture for flexible routing and switching in multihop point-to-point networks

S.W. Daniel, K.G. Shin, Sang Kyun Yun
1999 IEEE Transactions on Parallel and Distributed Systems  
These diverse characteristics affect the performance and suitability of particular routing and switching policies in multihop point-to-point networks.  ...  In addition, a flexible router can support several applications or traffic types simultaneously, enabling better support of applications with multiple traffic classes.  ...  ACKNOWLEDGMENTS The work reported in this paper was supported in part by the U.S. National Science Foundation under grant MIP-9203895 and by the KOSEF under the postdoctoral fellowship.  ... 
doi:10.1109/71.744841 fatcat:dtrg2awoabhydnhqwjjezjvexa

Efficient Link Capacity and QoS Design for Network-on-Chip

Z. Guz, I. Walter, E. Bolotin, I. Cidon, R. Ginosar, A. Kolodny
2006 Proceedings of the Design Automation & Test in Europe Conference  
The goal of the link capacity design process is to minimize the network cost (in terms of area and power) while maintaining the required quality of service (QoS), defined in terms of acceptable packet  ...  Communication resource costs are minimized under Quality-of-Service timing constraints.  ...  The concept of Network on a Chip (NoC) (introduced in [1] , [2] ) suggests that different modules service (QoS) of different inter-module traffic types.  ... 
doi:10.1109/date.2006.243951 dblp:conf/date/GuzWBCGK06 fatcat:sv2vdjhq5ve25hrhlquxdmovte
« Previous Showing results 1 — 15 out of 1,080 results