Application of Self-Compacting Concrete, Worldwide Experiences

Publish Year: 1390
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,791

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

SASTECH05_113

تاریخ نمایه سازی: 22 مرداد 1391

Abstract:

Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, one attacker receives and copies packets from its neighbors, and forwards them to the other colluding attacker through the wormhole tunnel. However they need special hardware to support such communication.This article reviews wormhole attack on ad hoc networks and discusses approaches for preventing wormhole attack in these networks.

Authors

Amir Hosein Bakhtiarian

The Bsc. Student Of Islamic Azad University, Hamedan branch

Morteza Shokri

The faculty member of Islamic Azad University, Hamedan branch.

Mohammad Reza Sabour

Environmental Engineering, Assistant Professor, Civil Engineering Department

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Hu. Y. C., Perrig. A. & Johnson. D. B. (2003). ...
  • "sAsTech 2011, Khavaran Higher-education Institute, Mashhad, Iran. May 12-14. ...
  • Khabbazian.M, Mercier. H & Bhargava. v.K. (2009). Severity Analysis and ...
  • Hu. L. & Evans D., (2004). Using directional antennas to ...
  • Capkun. S., Buttyan. L. & Hubaux. J. P., (2003). SECTOR: ...
  • Kassi.R.E, Chehab A., & Dway Z. (2005). DAWWSEN: A Defense ...
  • Park. T., & Shin. K. (2004). LISP: A Lightweight Security ...
  • Lazos. L, Poovendran. R., Meadows. C., Syverson. P. & Chang. ...
  • Win. K.S. (2008). Analysis of Detecting Wormhole Attack in Wireless ...
  • Awerbuch. B., Holmer. D., Nita-Rotaru. C. & Rubens. H (2002). ...
  • Hu. Y.-C., Perrig. A. & Johnson. D. B. (2006). Wormhole ...
  • Hu. Y., Perrig. A. & Johnson. D. (2004). Packet Leashes: ...
  • Eriksson. J., Kri shnamurthy. S. V. & Faloutsos. M. (2006). ...
  • Maheshwari. R., Gao. J. & Das. S. R. (2007). Detecting ...
  • Wang, Wong. (2007). EDWA: End-to-end detection of wormhole attack in ...
  • Roy. B., &Chaki, (2009). A NEW CL USTER -BASED WORMHOLE ...
  • Ghanbarzadeh .Y, Heidari.A. (in proc 2011). Wormhole Attack in Wireless ...
  • نمایش کامل مراجع