Welcome![Sign In][Sign Up]
Location:
Search - wormhole

Search list

[ExploitWormhole_Simulation_Code

Description: This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
Platform: | Size: 41831 | Author: 旺老财 | Hits:

[Other resourcewormhole

Description: Worm HoleThis excellent Java Applet displays a swirling worm hole on your page.一个优秀的Java Applet,可以在页面上显示一个旋转的虫孔。-Worm HoleThis excellent Java applet displays a swirling worm hole on your page. An excellent Java Applet, in the pages can be displayed on a rotating wormhole.
Platform: | Size: 8340 | Author: nala | Hits:

[J2MEwormhole

Description: Worm HoleThis excellent Java Applet displays a swirling worm hole on your page.一个优秀的Java Applet,可以在页面上显示一个旋转的虫孔。-Worm HoleThis excellent Java applet displays a swirling worm hole on your page. An excellent Java Applet, in the pages can be displayed on a rotating wormhole.
Platform: | Size: 8192 | Author: nala | Hits:

[CommunicationNS2_clusterbased_WSN

Description: ns2下面的clusterbased路由协议仿真源码包-following clusterbased Packet Routing protocol emulation source package
Platform: | Size: 70656 | Author: 尹浩 | Hits:

[OtherWormhole_Simulation_Code

Description: This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004. -This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
Platform: | Size: 41984 | Author: 旺老财 | Hits:

[Otherworm

Description: 片上网络,虫洞路由的研究,运行环境为opnet。-On-chip networks, wormhole routing study for the operating environment opnet.
Platform: | Size: 1684480 | Author: tantaiqiu | Hits:

[Otherdetect_wormhole_in_wsn.pdf.tar

Description: About detect wormhole in Wireless Sensor Network
Platform: | Size: 888832 | Author: nes | Hits:

[Other092021230.Rar

Description: “虫洞”是新一代的"云"服务信息查询软件,能够很好地支持:天气、公交、百科、提问、列车、快递、报价、翻译、余票、运势、笑话、短信、故事、小说、归属、字词典、快讯、凶吉、配对、QQ状态、诗词、NBA战况、条码验证、藏头诗等功能。 -" Wormhole" is a new generation of " cloud" service information software, can support: the weather, public transportation, Wikipedia, questions, train, express, quote, translation, I vote, fortune, jokes, text messages, stories, novels, attribution, word dictionary, newsletter, Luck, matching, QQ state, poetry, NBA fighting, bar code verification, possession of the first verse and so on.
Platform: | Size: 60416 | Author: 小英 | Hits:

[Program docthesis-1

Description: A REPORT ON WSN:A Wireless Protocol to Prevent Wormhole Attacks
Platform: | Size: 419840 | Author: yogesh | Hits:

[Program doc2

Description: simulation of wormhole attack
Platform: | Size: 3072 | Author: ankit | Hits:

[Internet-NetworkWormHole.tar

Description: Wormhole attack module.
Platform: | Size: 7168 | Author: martin | Hits:

[Software EngineeringWormhole-Ritesh.tar

Description: WORMHOLE PROGRAM FOR SIMPLE SCINARIO
Platform: | Size: 8192 | Author: santhosh | Hits:

[Scannermha_wh_traces.tar

Description: NS2 simulation trace files for Multi-Hop count analysis algorithm wormhole detection using False Positive flags and packet drops events
Platform: | Size: 541696 | Author: dooley | Hits:

[Scannerwormhole

Description: this source code contains wRMHOLE ATACK HAPPENS IN THE WIRELESS SENSOR NETWORK. THIS ATTACK DELAYS THE MESSAGE TRANSMISSION THOUGHOUT THE NETWORK. IN THIS WARM HOLE ATTACK OCCUR ON THE NODE DROPS ALL THE PACKET RECIEVED BY THIS
Platform: | Size: 46080 | Author: vikas | Hits:

[Internet-Networkworm

Description: 本程序是NS2下虫洞攻击的源码,在NS2下可以模拟虫洞攻击的过程,适合新手学习。-This program is under attack source wormhole NS2, NS2 can simulate the process in the wormhole attack, suitable for beginners to learn.
Platform: | Size: 2048 | Author: wangkai | Hits:

[Internet-NetworkLCM-MAC.tar

Description: implementation of wormhole attack in aodv
Platform: | Size: 92160 | Author: mary | Hits:

[Industry researchPreventing-Method-Of-Wormhole-Attack

Description: we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole detection techniques location based, time based, neighbour information based and authentication based methods using ConSetLoc, Time Petri net, ROCRSSI, LIDeA, Merkle algorithems to detect wormhole attack. And existing detection techniques and its advantages and limitations. -we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole detection techniques location based, time based, neighbour information based and authentication based methods using ConSetLoc, Time Petri net, ROCRSSI, LIDeA, Merkle algorithems to detect wormhole attack. And existing detection techniques and its advantages and limitations.
Platform: | Size: 175104 | Author: manthan | Hits:

[OS programWormhole-Attack

Description: detection wormhole attack
Platform: | Size: 32768 | Author: Marya | Hits:

[OtherSample-code-for-Ns2-Wormhole-attack

Description: sample NS2 source code(in texe file) that simulate WORMHOLE attack.
Platform: | Size: 2048 | Author: yonize | Hits:

[Internet-Networkwormhole-master

Description: wormhole attack detection
Platform: | Size: 217088 | Author: jhuven | Hits:
« 12 »

CodeBus www.codebus.net