搜索资源列表
Wormhole_Simulation_Code
- This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego
wormhole
- Worm HoleThis excellent Java Applet displays a swirling worm hole on your page.一个优秀的Java Applet,可以在页面上显示一个旋转的虫孔。-Worm HoleThis excellent Java applet displays a swirling worm hole on your page. An excellent Java Applet, i
wormhole
- Worm HoleThis excellent Java Applet displays a swirling worm hole on your page.一个优秀的Java Applet,可以在页面上显示一个旋转的虫孔。-Worm HoleThis excellent Java applet displays a swirling worm hole on your page. An excellent Java Applet, i
NS2_clusterbased_WSN
- ns2下面的clusterbased路由协议仿真源码包-following clusterbased Packet Routing protocol emulation source package
Wormhole_Simulation_Code
- This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego
worm
- 片上网络,虫洞路由的研究,运行环境为opnet。-On-chip networks, wormhole routing study for the operating environment opnet.
092021230.Rar
- “虫洞”是新一代的"云"服务信息查询软件,能够很好地支持:天气、公交、百科、提问、列车、快递、报价、翻译、余票、运势、笑话、短信、故事、小说、归属、字词典、快讯、凶吉、配对、QQ状态、诗词、NBA战况、条码验证、藏头诗等功能。 -" Wormhole" is a new generation of " cloud" service information software, can suppor
thesis-1
- A REPORT ON WSN:A Wireless Protocol to Prevent Wormhole Attacks
2
- simulation of wormhole attack
WormHole.tar
- Wormhole attack module.
Wormhole-Ritesh.tar
- WORMHOLE PROGRAM FOR SIMPLE SCINARIO
mha_wh_traces.tar
- NS2 simulation trace files for Multi-Hop count analysis algorithm wormhole detection using False Positive flags and packet drops events
wormhole
- this source code contains wRMHOLE ATACK HAPPENS IN THE WIRELESS SENSOR NETWORK. THIS ATTACK DELAYS THE MESSAGE TRANSMISSION THOUGHOUT THE NETWORK. IN THIS WARM HOLE ATTACK OCCUR ON THE NODE DROPS ALL THE PACKET RECIEVED
worm
- 本程序是NS2下虫洞攻击的源码,在NS2下可以模拟虫洞攻击的过程,适合新手学习。-This program is under attack source wormhole NS2, NS2 can simulate the process in the wormhole attack, suitable for beginners to learn.
LCM-MAC.tar
- implementation of wormhole attack in aodv
worm.tar
- This is the NS2 tcl code for implementing Wormhole attack in MANET
Preventing-Method-Of-Wormhole-Attack
- we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey
Wormhole-Attack
- detection wormhole attack
Sample-code-for-Ns2-Wormhole-attack
- sample NS2 source code(in texe file) that simulate WORMHOLE attack.
wormhole-master
- wormhole attack detection