Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


Tags: attack, Wormhole, Code, Matlab, Matlab Code for Wormhole attack,
 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Matlab Code for Wormhole attack
Post: #1

Hi Everyone..

I am Shah. I am working on a simulation for localization using Hello Flood attack in Matlab which i have completed. But now in a very short time i need matlab code for WORMHOLE ATTACK. Although code for wormhole attack is available in ns2 and c++ but prevously i am working on Matlab so i cannot switch the software to check the localizaton behavior of wormhole attack.

So if anyone can provide me Matlab code for wormhole attack or guide me how to convert ns2 codse into matlab.

Thanks..
Post: #2
As mobile ad hoc network applications are implemented and security emerges as a central requirement. In this article, we present the wormhole attack, a severe attack on ad hoc networks that is particularly challenging to defend itself. Attack of the wormhole is possible even if the attacker has not compromised any host, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker logs packets (or bits) into a network location, uploads them (possibly selectively) to another location and relays them to the network. Wormhole attack can be a serious threat to wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, could not find routes longer than one or two jumps, severely interrupting communication. We introduce a general mechanism, called packet leashes, to detect and, therefore, defend against wormhole attacks, and present a specific protocol, called TIK, which implements straps. We also discuss topology-based worm detection, and demonstrate that it is impossible for these approaches to detect some topolagies of worms.
 


[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  distance relay matlabe code Guest 1 0 Yesterday 12:24 PM
Last Post: jaseela123
  ecg signal enhancement in matlab Guest 1 280 18-11-2017 11:34 AM
Last Post: jaseela123
  matlab codes for opportunistic routing Guest 1 257 18-11-2017 11:22 AM
Last Post: jaseela123
Question is 456 2008 code free download in pdf Guest 1 252 18-11-2017 10:51 AM
Last Post: jaseela123
  redundant binary booth recoding vhdl code Guest 1 138 18-11-2017 10:32 AM
Last Post: jaseela123
Sad hide image inside another image using java source code Guest 1 208 18-11-2017 10:10 AM
Last Post: jaseela123
  piso algorithm code Guest 1 0 17-11-2017 12:37 PM
Last Post: jaseela123
  java code for sport shop system Guest 1 0 17-11-2017 12:16 PM
Last Post: jaseela123
  hello madeena operator code Guest 1 186 17-11-2017 11:43 AM
Last Post: jaseela123
  hostel management system project source code in vb Guest 2 0 15-11-2017 11:36 AM
Last Post: jaseela123
This Page May Contain What is Matlab Code for Wormhole attack And Latest Information/News About Matlab Code for Wormhole attack,If Not ...Use Search to get more info about Matlab Code for Wormhole attack Or Ask Here

Options: