首页> 外文期刊>International Journal of Applied Engineering Research >Analysis of Secured Energy Efficient Key Management in Wormhole Attack
【24h】

Analysis of Secured Energy Efficient Key Management in Wormhole Attack

机译:蠕虫攻击中安全节能密钥管理的分析

获取原文
获取原文并翻译 | 示例
       

摘要

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it two another attacker at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information? there is need of developing some secured mechanism for wormhole detection. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with comparison of different wormhole detection techniques in ad-hoc wireless network.
机译:自组织网络是临时建立的无线网络,不需要固定的基础结构,也称为无基础结构网络。由于ad-hoc网络存在一些缺陷,例如共享的无线媒体,并且缺乏任何中央协调,因此与有线网络相比,它们更容易受到攻击。在所有攻击中,虫洞攻击是最严重的攻击。在此攻击中,攻击者会在网络中的一个位置捕获数据包,然后再通过较远的位置将其发送给另一位攻击者,这是通过不同的方式(例如数据包封装,使用大功率传输或使用直接天线)建立的。这是两个勾结的攻击者之间的隧道,它是虚拟的,被称为虫洞。即使攻击者没有任何主机,该蠕虫攻击也是可能的,并且所有通信都提供真实性和机密性。通过使用各种方法来寻找解决虫洞攻击的方法,仍然可以修改数据包的动态信息。因此,为了在某些特殊情况(例如战场)中提供更强大的保护,这需要高度安全的信息?需要开发一些用于虫洞检测的安全机制。考虑到该问题,提出了所提出的方案。本文讨论了拟议的蠕虫攻击工作,并比较了ad-hoc无线网络中不同的蠕虫检测技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号