Location:
Search - wormhole
Search list
Description: This code was used to produce simulation results described in:
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security
Symposium, San Diego, 5-6 February 2004.
Platform: |
Size: 41831 |
Author: 旺老财 |
Hits:
Description: Worm HoleThis excellent Java Applet displays a swirling worm hole on your page.一个优秀的Java Applet,可以在页面上显示一个旋转的虫孔。-Worm HoleThis excellent Java applet displays a swirling worm hole on your page. An excellent Java Applet, in the pages can be displayed on a rotating wormhole.
Platform: |
Size: 8340 |
Author: nala |
Hits:
Description: Worm HoleThis excellent Java Applet displays a swirling worm hole on your page.一个优秀的Java Applet,可以在页面上显示一个旋转的虫孔。-Worm HoleThis excellent Java applet displays a swirling worm hole on your page. An excellent Java Applet, in the pages can be displayed on a rotating wormhole.
Platform: |
Size: 8192 |
Author: nala |
Hits:
Description: ns2下面的clusterbased路由协议仿真源码包-following clusterbased Packet Routing protocol emulation source package
Platform: |
Size: 70656 |
Author: 尹浩 |
Hits:
Description: This code was used to produce simulation results described in:
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security
Symposium, San Diego, 5-6 February 2004. -This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
Platform: |
Size: 41984 |
Author: 旺老财 |
Hits:
Description: 片上网络,虫洞路由的研究,运行环境为opnet。-On-chip networks, wormhole routing study for the operating environment opnet.
Platform: |
Size: 1684480 |
Author: tantaiqiu |
Hits:
Description: About detect wormhole in Wireless Sensor Network
Platform: |
Size: 888832 |
Author: nes |
Hits:
Description: “虫洞”是新一代的"云"服务信息查询软件,能够很好地支持:天气、公交、百科、提问、列车、快递、报价、翻译、余票、运势、笑话、短信、故事、小说、归属、字词典、快讯、凶吉、配对、QQ状态、诗词、NBA战况、条码验证、藏头诗等功能。
-" Wormhole" is a new generation of " cloud" service information software, can support: the weather, public transportation, Wikipedia, questions, train, express, quote, translation, I vote, fortune, jokes, text messages, stories, novels, attribution, word dictionary, newsletter, Luck, matching, QQ state, poetry, NBA fighting, bar code verification, possession of the first verse and so on.
Platform: |
Size: 60416 |
Author: 小英 |
Hits:
Description: A REPORT ON WSN:A Wireless Protocol to Prevent Wormhole Attacks
Platform: |
Size: 419840 |
Author: yogesh |
Hits:
Description: simulation of wormhole attack
Platform: |
Size: 3072 |
Author: ankit |
Hits:
Description: Wormhole attack module.
Platform: |
Size: 7168 |
Author: martin |
Hits:
Description: WORMHOLE PROGRAM FOR SIMPLE SCINARIO
Platform: |
Size: 8192 |
Author: santhosh |
Hits:
Description: NS2 simulation trace files for Multi-Hop count analysis algorithm wormhole detection using False Positive flags and packet drops events
Platform: |
Size: 541696 |
Author: dooley |
Hits:
Description: this source code contains wRMHOLE ATACK HAPPENS IN THE WIRELESS SENSOR NETWORK. THIS ATTACK DELAYS THE MESSAGE TRANSMISSION THOUGHOUT THE NETWORK. IN THIS WARM HOLE ATTACK OCCUR ON THE NODE DROPS ALL THE PACKET RECIEVED BY THIS
Platform: |
Size: 46080 |
Author: vikas |
Hits:
Description: 本程序是NS2下虫洞攻击的源码,在NS2下可以模拟虫洞攻击的过程,适合新手学习。-This program is under attack source wormhole NS2, NS2 can simulate the process in the wormhole attack, suitable for beginners to learn.
Platform: |
Size: 2048 |
Author: wangkai |
Hits:
Description: implementation of wormhole attack in aodv
Platform: |
Size: 92160 |
Author: mary |
Hits:
Description: we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole detection techniques location based, time based, neighbour information based and authentication based methods using ConSetLoc, Time Petri net, ROCRSSI, LIDeA, Merkle algorithems to detect wormhole attack. And existing detection techniques and its advantages and limitations.
-we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole detection techniques location based, time based, neighbour information based and authentication based methods using ConSetLoc, Time Petri net, ROCRSSI, LIDeA, Merkle algorithems to detect wormhole attack. And existing detection techniques and its advantages and limitations.
Platform: |
Size: 175104 |
Author: manthan |
Hits:
Description: detection wormhole attack
Platform: |
Size: 32768 |
Author: Marya |
Hits:
Description: sample NS2 source code(in texe file) that simulate WORMHOLE attack.
Platform: |
Size: 2048 |
Author: yonize |
Hits:
Description: wormhole attack detection
Platform: |
Size: 217088 |
Author: jhuven
|
Hits: