This work revisits the analysis of charged Casimir wormhole solutions within the framework of Einstein–Gauss–Bonnet(EGB)gravity,addressing a critical inconsistency in the approach presented by Farooq et al.Specifica...This work revisits the analysis of charged Casimir wormhole solutions within the framework of Einstein–Gauss–Bonnet(EGB)gravity,addressing a critical inconsistency in the approach presented by Farooq et al.Specifically,we show that their use of four-dimensional Casimir and electric field energy densities are incompatible with the higher-dimensional nature of EGB gravity,which requires D≥5.We provide the correct formulation for the energy densities and revise the wormhole properties under this framework,offering a refined perspective on the interplay between extra dimensions and Casimir effects in EGB gravity.展开更多
The Sine and Wormhole Energy Whale Optimization Algorithm(SWEWOA)represents an advanced solution method for resolving Optimal Power Flow(OPF)problems in power systems equipped with Flexible AC Transmission System(FACT...The Sine and Wormhole Energy Whale Optimization Algorithm(SWEWOA)represents an advanced solution method for resolving Optimal Power Flow(OPF)problems in power systems equipped with Flexible AC Transmission System(FACTS)devices which include Thyristor-Controlled Series Compensator(TCSC),Thyristor-Controlled Phase Shifter(TCPS),and Static Var Compensator(SVC).SWEWOA expands Whale Optimization Algorithm(WOA)through the integration of sine and wormhole energy features thus improving exploration and exploitation capabilities for efficient convergence in complex non-linear OPF problems.A performance evaluation of SWEWOA takes place on the IEEE-30 bus test system through static and dynamic loading scenarios where it demonstrates better results than five contemporary algorithms:Adaptive Chaotic WOA(ACWOA),WOA,Chaotic WOA(CWOA),Sine Cosine Algorithm Differential Evolution(SCADE),and Hybrid Grey Wolf Optimization(HGWO).The research shows that SWEWOA delivers superior generation cost reduction than other algorithms by reaching a minimum of 0.9%better performance.SWEWOA demonstrates superior power loss performance by achieving(P_(loss,min))at the lowest level compared to all other tested algorithms which leads to better system energy efficiency.The dynamic loading performance of SWEWOA leads to a 4.38%reduction in gross costs which proves its capability to handle different operating conditions.The algorithm achieves top performance in Friedman Rank Test(FRT)assessments through multiple performance metrics which verifies its consistent reliability and strong stability during changing power demands.The repeated simulations show that SWEWOA generates mean costs(C_(gen,min))and mean power loss values(P_(loss,min))with small deviations which indicate its capability to maintain cost-effective solutions in each simulation run.SWEWOA demonstrates great potential as an advanced optimization solution for power system operations through the results presented in this study.展开更多
In this article, our primary objective is to construct new wormhole solutions by involving a Yukawa-corrected form of Casimir energy density in a well-motivated gravitational theory that allows the coupling of curvatu...In this article, our primary objective is to construct new wormhole solutions by involving a Yukawa-corrected form of Casimir energy density in a well-motivated gravitational theory that allows the coupling of curvature and matter, namely the F(R,T) theory. To achieve this goal, a wormhole geometry exhibiting a spherically-symmetric nature is taken into account and anisotropic fluid is assumed to be the background ordinary matter source.We first consider the simple linear F(R,T) theory by assuming F(R,T) = R+ 2ζ T with L_m=-P(average pressure). Secondly, we utilize the conformal symmetries of the spherical-symmetric geometry for simplifying the resulting field equations and obtain the corresponding analytical form of the wormhole solution. In both cases, the viability of the proposed solutions is examined by checking the basic features of the wormhole shape model along with the validity of null energy constraints. Further, we study the volume integral quantifier(VIQ), exoticity factor and stability through the Tolman–Oppenheimer–Volkov(TOV) equation as well as the adiabatic index, active gravitational mass and complexity factor graphically. Lastly, we use a newly-proposed wormhole shape function to find the expressions of state variables and discuss the validity of energy bounds. We also explore the significance of this wormhole shape model through different quantities graphically. In all scenarios, the presented solutions are found to be new, promising and viable.展开更多
This investigation assesses the feasibility of a traversable wormhole by examining the energy densities associated with charged Casimir phenomena.We focus on the influence of the electromagnetic field created by an el...This investigation assesses the feasibility of a traversable wormhole by examining the energy densities associated with charged Casimir phenomena.We focus on the influence of the electromagnetic field created by an electric charge as well as the negative energy density arising from the Casimir source.We have developed different shape functions by defining energy densities from this combination.This paper explores various configurations of Casimir energy densities,specifically those occurring between parallel plates,cylinders and spheres positioned at specified distances from each other.Furthermore,the impact of the generalized uncertainty principle correction is also examined.The behavior of wormhole conditions is evaluated based on the Gauss–Bonnet coupled parameter(μ)and electric charge(Q)through the electromagnetic energy density constraint.This is attributed to the fact that the electromagnetic field satisfies the characteristicρ=-pr.Subsequently,we examine the active gravitational mass of the generated wormhole geometries and explore the behavior ofμand Q concerning active mass.The embedding representations for all formulated shape functions are examined.Investigations of the complexity factor of the charged Casimir wormhole have demonstrated that the values of the complexity factor consistently fall within a particular range in all scenarios.Finally,using the generalized Tolman–Oppenheimer–Volkoff equation,we examine the stability of the resulting charged Casimir wormhole solutions.展开更多
Wormhole attack is one of the most devastating threats for range-free localization in wireless sensor networks. In this paper, we evaluate three statistical estimation methods with the same network model and geographi...Wormhole attack is one of the most devastating threats for range-free localization in wireless sensor networks. In this paper, we evaluate three statistical estimation methods with the same network model and geographic information obtailaed by the DV-Hop algorithm. We analyze the limits of Minimum Mean Square Estimate (MMSE), Least Median of Squares (LMS) and Enhanced greedy At- tack-Resistant MMSE (EARMMSE) and propose an improved EARMMSE with the hop-distance relationship, named EARMMSE+. Simulation results illustrate the performance of MMSE, LMS and EARMMSE+ with different anchor fraction, the length of wormhole link and the average local neighborhood and show that EARMMSE+ outperforms MMSE and LMS.展开更多
An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most o...An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it.During data sharing,security is an important concern in such networks as they are prone to many threats,of which the deadliest is the wormhole attack.These attacks are launched without acquiring the vital information of the network and they highly compromise the communication,security,and performance of the network.In the IoT-based network environment,its mitigation becomes more challenging because of the low resource availability in the sensing devices.We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology.The analysis of literature has motivated our research.In this paper,we developed the ESWI technique for detecting the wormhole attack while improving the performance and security.This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation.The simulation results of our technique show competitive results for the detection rate and packet delivery ratio.It also gives an increased throughput,a decreased end-to-end delay,and a much-reduced consumption of energy.展开更多
This analysis explores the new wormhole(WH)solution in the background of teleparallel gravity with minimal matter coupling.To complete this study,we consider the conformal symmetry with non-zero Killing vectors.The ex...This analysis explores the new wormhole(WH)solution in the background of teleparallel gravity with minimal matter coupling.To complete this study,we consider the conformal symmetry with non-zero Killing vectors.The exact shape function is computed by considering the linear equation of state with the phantom regime.The energy conditions are investigated for the calculated shape function with the equation of state parameter.The presence of exotic matter is confirmed due to the violation of the null energy condition.The current study also explores the physical properties of the epicyclic frequencies with quasi-periodic oscillations.In the astrophysical,epicyclic frequencies are extensively employed to explore the self-gravitating system.It is concluded that a stable WH solution is acceptable for WH geometry.展开更多
As the applications of wireless sensor networks(WSNs) diversify,providing secure communication is emerging as a critical requirement. In this paper,we investigate the detection of wormhole attack,a serious security is...As the applications of wireless sensor networks(WSNs) diversify,providing secure communication is emerging as a critical requirement. In this paper,we investigate the detection of wormhole attack,a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent,as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number,WAPN,which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the in-fluencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements,such as node localization,tight synchronization,or directional antennas. WAPN uses the neighboring-node-number as the judging criterion,since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly,we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes' constraints in computing and memory capacity. Finally,we propose a simple method to obtain the threshold number,which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters.展开更多
While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null...While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null energy condition, calling for the existence of exotic matter. The Casimir effect has shown that this physical requirement can be met on a small scale, thereby solving a key conceptual problem. The Casimir effect does not, however, guarantee that the small-scale violation is sufficient for supporting a macroscopic wormhole. The purpose of this paper is to connect the Casimir effect to noncommutative geometry, which also aims to accommodate small-scale effects, the difference being that these can now be viewed as intrinsic properties of spacetime. As a result, the noncommutative effects can be implemented by modifying only the energy momentum tensor in the Einstein field equations, while leaving the Einstein tensor unchanged. The wormhole can therefore be macroscopic in spite of the small Casimir effect.展开更多
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised secur...Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security.展开更多
This paper discusses the effect that conformal symmetry can have on a charged wormhole. The analysis yields a physical interpretation of the conformal factor in terms of the electric charge. The rate of change of the ...This paper discusses the effect that conformal symmetry can have on a charged wormhole. The analysis yields a physical interpretation of the conformal factor in terms of the electric charge. The rate of change of the conformal factor determines much of the outcome, which ranges from having no solution to wormholes having either one or two throats.展开更多
This paper investigates wormhole solutions within the framework of extended symmetric teleparallel gravity,incorporating non-commutative geometry,and conformal symmetries.To achieve this,we examine the linear wormhole...This paper investigates wormhole solutions within the framework of extended symmetric teleparallel gravity,incorporating non-commutative geometry,and conformal symmetries.To achieve this,we examine the linear wormhole model with anisotropic fluid under Gaussian and Lorentzian distributions.The primary objective is to derive wormhole solutions while considering the influence of the shape function on model parameters under Gaussian and Lorentzian distributions.The resulting shape function satisfies all the necessary conditions for a traversable wormhole.Furthermore,we analyze the characteristics of the energy conditions and provide a detailed graphical discussion of the matter contents via energy conditions.Additionally,we explore the effect of anisotropy under Gaussian and Lorentzian distributions.Finally,we present our conclusions based on the obtained results.展开更多
In this work,we have explored wormhole(WH)solutions in F(R,L_(m))gravity by assuming the Morris-Thorne WH metric and F(R,Lm)=R/2+(1+γR)L_(m),whereγis the free model parameter.We determined the WH solutions by utiliz...In this work,we have explored wormhole(WH)solutions in F(R,L_(m))gravity by assuming the Morris-Thorne WH metric and F(R,Lm)=R/2+(1+γR)L_(m),whereγis the free model parameter.We determined the WH solutions by utilizing two newly developed shape functions(SF)that satisfy all basic conditions for a WH’s physical validity.We also observe that the null energy condition(NEC)behaves negatively.Finally,for both models,we use the volume integral quantifier(VIQ)and Tolman-Oppenheimer-Volkoff(TOV)equation to determine how much exotic matter is needed near the WH throat and the stability of the WH.The extensive detailed discussions of the matter components have been done via graphical analysis.The obtained WH geometries meet the physically acceptable conditions for a stable wormhole.展开更多
OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoe Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, ...OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoe Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.展开更多
In this paper,we explore static spherically symmetric charged wormhole solutions in extended teleparallel gravity taking power-law f(T) models.We consider noncommutative geometry under Lorentzian distribution.In order...In this paper,we explore static spherically symmetric charged wormhole solutions in extended teleparallel gravity taking power-law f(T) models.We consider noncommutative geometry under Lorentzian distribution.In order to obtain matter components,we develop field equations using effective energy-momentum tensor for non-diagonal tetrad.We explore solutions by considering various viable power-law f(T) models,which also include teleparallel gravity case.The violation of energy conditions obtain by exotic matter to form wormhole solutions in teleparallel case while,physical acceptable wormhole solutions exist for charged noncommutative wormhole solutions for some cases of power-law models.The effective energy-momentum tensor and charge are responsible for the violation of the energy conditions.Also,we check the equilibrium condition for these solutions.The equilibrium condition meets for the teleparallel case and some power-law solutions while remaining solutions are either in less equilibrium or in disequilibrium situation.展开更多
Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and prio...Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.展开更多
Detection of thewormhole attacks is a cumbersome process,particularly simplex and duplex over thewireless sensor networks(WSNs).Wormhole attacks are characterized as distributed passive attacks that can destabilize or...Detection of thewormhole attacks is a cumbersome process,particularly simplex and duplex over thewireless sensor networks(WSNs).Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs.The distributed passive nature of these attacks makes them enormously challenging to detect.The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment.And further to detect the serious routing-disruption attack“Wormhole Attack”step by step through the different network mechanisms.In this paper,a new multi-step detection(MSD)scheme is introduced that can effectively detect the wormhole attacks for WSN.The MSD consists of three algorithms to detect and prevent the simplex and duplex wormhole attacks.Furthermore,the proposed scheme integrated five detection modules to systematically detect,recover,and isolate wormhole attacks.Simulation results conducted inOMNET++show that the proposedMSDhas lower false detection and false toleration rates.Besides,MSDcan effectively detect wormhole attacks in a completely distributed network environment,as suggested by the simulation results.展开更多
基金the National Council for Scientific and Technological Development-CNPq(PQ 315926/2021-0)FUNCAP,through the project BP5-0197-00117.01.00/22,for financial support。
文摘This work revisits the analysis of charged Casimir wormhole solutions within the framework of Einstein–Gauss–Bonnet(EGB)gravity,addressing a critical inconsistency in the approach presented by Farooq et al.Specifically,we show that their use of four-dimensional Casimir and electric field energy densities are incompatible with the higher-dimensional nature of EGB gravity,which requires D≥5.We provide the correct formulation for the energy densities and revise the wormhole properties under this framework,offering a refined perspective on the interplay between extra dimensions and Casimir effects in EGB gravity.
文摘The Sine and Wormhole Energy Whale Optimization Algorithm(SWEWOA)represents an advanced solution method for resolving Optimal Power Flow(OPF)problems in power systems equipped with Flexible AC Transmission System(FACTS)devices which include Thyristor-Controlled Series Compensator(TCSC),Thyristor-Controlled Phase Shifter(TCPS),and Static Var Compensator(SVC).SWEWOA expands Whale Optimization Algorithm(WOA)through the integration of sine and wormhole energy features thus improving exploration and exploitation capabilities for efficient convergence in complex non-linear OPF problems.A performance evaluation of SWEWOA takes place on the IEEE-30 bus test system through static and dynamic loading scenarios where it demonstrates better results than five contemporary algorithms:Adaptive Chaotic WOA(ACWOA),WOA,Chaotic WOA(CWOA),Sine Cosine Algorithm Differential Evolution(SCADE),and Hybrid Grey Wolf Optimization(HGWO).The research shows that SWEWOA delivers superior generation cost reduction than other algorithms by reaching a minimum of 0.9%better performance.SWEWOA demonstrates superior power loss performance by achieving(P_(loss,min))at the lowest level compared to all other tested algorithms which leads to better system energy efficiency.The dynamic loading performance of SWEWOA leads to a 4.38%reduction in gross costs which proves its capability to handle different operating conditions.The algorithm achieves top performance in Friedman Rank Test(FRT)assessments through multiple performance metrics which verifies its consistent reliability and strong stability during changing power demands.The repeated simulations show that SWEWOA generates mean costs(C_(gen,min))and mean power loss values(P_(loss,min))with small deviations which indicate its capability to maintain cost-effective solutions in each simulation run.SWEWOA demonstrates great potential as an advanced optimization solution for power system operations through the results presented in this study.
文摘In this article, our primary objective is to construct new wormhole solutions by involving a Yukawa-corrected form of Casimir energy density in a well-motivated gravitational theory that allows the coupling of curvature and matter, namely the F(R,T) theory. To achieve this goal, a wormhole geometry exhibiting a spherically-symmetric nature is taken into account and anisotropic fluid is assumed to be the background ordinary matter source.We first consider the simple linear F(R,T) theory by assuming F(R,T) = R+ 2ζ T with L_m=-P(average pressure). Secondly, we utilize the conformal symmetries of the spherical-symmetric geometry for simplifying the resulting field equations and obtain the corresponding analytical form of the wormhole solution. In both cases, the viability of the proposed solutions is examined by checking the basic features of the wormhole shape model along with the validity of null energy constraints. Further, we study the volume integral quantifier(VIQ), exoticity factor and stability through the Tolman–Oppenheimer–Volkov(TOV) equation as well as the adiabatic index, active gravitational mass and complexity factor graphically. Lastly, we use a newly-proposed wormhole shape function to find the expressions of state variables and discuss the validity of energy bounds. We also explore the significance of this wormhole shape model through different quantities graphically. In all scenarios, the presented solutions are found to be new, promising and viable.
基金the Deanship of Research and Graduate Studies at King Khalid University for funding this work through a Large Research Project under Grant No.RGP2/453/45partially supported by the National Natural Science Foundation of China under Grant No.11988101。
文摘This investigation assesses the feasibility of a traversable wormhole by examining the energy densities associated with charged Casimir phenomena.We focus on the influence of the electromagnetic field created by an electric charge as well as the negative energy density arising from the Casimir source.We have developed different shape functions by defining energy densities from this combination.This paper explores various configurations of Casimir energy densities,specifically those occurring between parallel plates,cylinders and spheres positioned at specified distances from each other.Furthermore,the impact of the generalized uncertainty principle correction is also examined.The behavior of wormhole conditions is evaluated based on the Gauss–Bonnet coupled parameter(μ)and electric charge(Q)through the electromagnetic energy density constraint.This is attributed to the fact that the electromagnetic field satisfies the characteristicρ=-pr.Subsequently,we examine the active gravitational mass of the generated wormhole geometries and explore the behavior ofμand Q concerning active mass.The embedding representations for all formulated shape functions are examined.Investigations of the complexity factor of the charged Casimir wormhole have demonstrated that the values of the complexity factor consistently fall within a particular range in all scenarios.Finally,using the generalized Tolman–Oppenheimer–Volkoff equation,we examine the stability of the resulting charged Casimir wormhole solutions.
基金Acknov,.4edgements This work was supported in part by National Basic Research Program of China ("973 program") under contract No. 2007CB307101, and in part by National Natural Science Foundation of China under Grant No. 60833002, No. 60802016 and No.60972010.
文摘Wormhole attack is one of the most devastating threats for range-free localization in wireless sensor networks. In this paper, we evaluate three statistical estimation methods with the same network model and geographic information obtailaed by the DV-Hop algorithm. We analyze the limits of Minimum Mean Square Estimate (MMSE), Least Median of Squares (LMS) and Enhanced greedy At- tack-Resistant MMSE (EARMMSE) and propose an improved EARMMSE with the hop-distance relationship, named EARMMSE+. Simulation results illustrate the performance of MMSE, LMS and EARMMSE+ with different anchor fraction, the length of wormhole link and the average local neighborhood and show that EARMMSE+ outperforms MMSE and LMS.
文摘An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it.During data sharing,security is an important concern in such networks as they are prone to many threats,of which the deadliest is the wormhole attack.These attacks are launched without acquiring the vital information of the network and they highly compromise the communication,security,and performance of the network.In the IoT-based network environment,its mitigation becomes more challenging because of the low resource availability in the sensing devices.We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology.The analysis of literature has motivated our research.In this paper,we developed the ESWI technique for detecting the wormhole attack while improving the performance and security.This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation.The simulation results of our technique show competitive results for the detection rate and packet delivery ratio.It also gives an increased throughput,a decreased end-to-end delay,and a much-reduced consumption of energy.
基金Grant No.ZC304022919 to support his Postdoctoral Fellowship at Zhejiang Normal University,P.R.China。
文摘This analysis explores the new wormhole(WH)solution in the background of teleparallel gravity with minimal matter coupling.To complete this study,we consider the conformal symmetry with non-zero Killing vectors.The exact shape function is computed by considering the linear equation of state with the phantom regime.The energy conditions are investigated for the calculated shape function with the equation of state parameter.The presence of exotic matter is confirmed due to the violation of the null energy condition.The current study also explores the physical properties of the epicyclic frequencies with quasi-periodic oscillations.In the astrophysical,epicyclic frequencies are extensively employed to explore the self-gravitating system.It is concluded that a stable WH solution is acceptable for WH geometry.
文摘As the applications of wireless sensor networks(WSNs) diversify,providing secure communication is emerging as a critical requirement. In this paper,we investigate the detection of wormhole attack,a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent,as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number,WAPN,which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the in-fluencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements,such as node localization,tight synchronization,or directional antennas. WAPN uses the neighboring-node-number as the judging criterion,since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly,we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes' constraints in computing and memory capacity. Finally,we propose a simple method to obtain the threshold number,which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters.
文摘While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null energy condition, calling for the existence of exotic matter. The Casimir effect has shown that this physical requirement can be met on a small scale, thereby solving a key conceptual problem. The Casimir effect does not, however, guarantee that the small-scale violation is sufficient for supporting a macroscopic wormhole. The purpose of this paper is to connect the Casimir effect to noncommutative geometry, which also aims to accommodate small-scale effects, the difference being that these can now be viewed as intrinsic properties of spacetime. As a result, the noncommutative effects can be implemented by modifying only the energy momentum tensor in the Einstein field equations, while leaving the Einstein tensor unchanged. The wormhole can therefore be macroscopic in spite of the small Casimir effect.
文摘Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security.
文摘This paper discusses the effect that conformal symmetry can have on a charged wormhole. The analysis yields a physical interpretation of the conformal factor in terms of the electric charge. The rate of change of the conformal factor determines much of the outcome, which ranges from having no solution to wormholes having either one or two throats.
基金DST,New Delhi,India,for its financial support for research facilities under DSTFIST-2019。
文摘This paper investigates wormhole solutions within the framework of extended symmetric teleparallel gravity,incorporating non-commutative geometry,and conformal symmetries.To achieve this,we examine the linear wormhole model with anisotropic fluid under Gaussian and Lorentzian distributions.The primary objective is to derive wormhole solutions while considering the influence of the shape function on model parameters under Gaussian and Lorentzian distributions.The resulting shape function satisfies all the necessary conditions for a traversable wormhole.Furthermore,we analyze the characteristics of the energy conditions and provide a detailed graphical discussion of the matter contents via energy conditions.Additionally,we explore the effect of anisotropy under Gaussian and Lorentzian distributions.Finally,we present our conclusions based on the obtained results.
基金S Chaudhary expresses his gratitude to the Central University of Haryana for providing a University Research Fellowship (URF) under the Reg. No. 222019the Department of Mathematics, Central University of Haryanathe University Grant Commission (UGC), New Delhi, India under the NTA Ref. No. 211610000030 for providing financial support
文摘In this work,we have explored wormhole(WH)solutions in F(R,L_(m))gravity by assuming the Morris-Thorne WH metric and F(R,Lm)=R/2+(1+γR)L_(m),whereγis the free model parameter.We determined the WH solutions by utilizing two newly developed shape functions(SF)that satisfy all basic conditions for a WH’s physical validity.We also observe that the null energy condition(NEC)behaves negatively.Finally,for both models,we use the volume integral quantifier(VIQ)and Tolman-Oppenheimer-Volkoff(TOV)equation to determine how much exotic matter is needed near the WH throat and the stability of the WH.The extensive detailed discussions of the matter components have been done via graphical analysis.The obtained WH geometries meet the physically acceptable conditions for a stable wormhole.
基金Supported by the Natural Science Foundation of Hubei Province(No.2005ABA243) .
文摘OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoe Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.
文摘In this paper,we explore static spherically symmetric charged wormhole solutions in extended teleparallel gravity taking power-law f(T) models.We consider noncommutative geometry under Lorentzian distribution.In order to obtain matter components,we develop field equations using effective energy-momentum tensor for non-diagonal tetrad.We explore solutions by considering various viable power-law f(T) models,which also include teleparallel gravity case.The violation of energy conditions obtain by exotic matter to form wormhole solutions in teleparallel case while,physical acceptable wormhole solutions exist for charged noncommutative wormhole solutions for some cases of power-law models.The effective energy-momentum tensor and charge are responsible for the violation of the energy conditions.Also,we check the equilibrium condition for these solutions.The equilibrium condition meets for the teleparallel case and some power-law solutions while remaining solutions are either in less equilibrium or in disequilibrium situation.
文摘Wormhole attack is a serious threat against MANET (mobile ad hoc network) and its routing protocols. A new approach—tunnel key node identification (TKNI) was proposed. Based on tunnel-key-node identification and priority-based route discovery, TKNI can rapidly rebuild the communications that have been blocked by wormhole attack. Compared to previous approaches, the proposed approach aims at both static and dynamic topology environment, involves addressing visible and invisible wormhole attack modes, requires no extra hardware, has a low overhead, and can be easily applied to MANET.
文摘Detection of thewormhole attacks is a cumbersome process,particularly simplex and duplex over thewireless sensor networks(WSNs).Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs.The distributed passive nature of these attacks makes them enormously challenging to detect.The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment.And further to detect the serious routing-disruption attack“Wormhole Attack”step by step through the different network mechanisms.In this paper,a new multi-step detection(MSD)scheme is introduced that can effectively detect the wormhole attacks for WSN.The MSD consists of three algorithms to detect and prevent the simplex and duplex wormhole attacks.Furthermore,the proposed scheme integrated five detection modules to systematically detect,recover,and isolate wormhole attacks.Simulation results conducted inOMNET++show that the proposedMSDhas lower false detection and false toleration rates.Besides,MSDcan effectively detect wormhole attacks in a completely distributed network environment,as suggested by the simulation results.