Results 161 to 170 of about 413,930 (174)
Some of the next articles are maybe not open access.
Black hole attack in mobile Ad Hoc networks
Proceedings of the 42nd annual Southeast regional conference, 2004The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header.
Seungjin Park+2 more
openaire +2 more sources
Black Holes and Loose Connections in a Global Urban Network
The Professional Geographer, 2004This paper introduces the concept of black holes and loose connections in the global urban hierarchy. Black holes are defined as large cities, with a population of over 3 million that are not classified as world cities. The paper draws upon a classification that uses advanced producer services as an indicator of world city status.
openaire +3 more sources
Searching for Black-Hole Faults in a Network Using Multiple Agents
2006We consider a fixed communication network where (software) agents can move freely from node to node along the edges. A black hole is a faulty or malicious node in the network such that if an agent enters this node, then it immediately “dies.” We are interested in designing an efficient communication algorithm for the agents to identify all black holes.
Cooper, Colin+2 more
openaire +5 more sources
Analysis of Black Hole Router Attack in Network-on-Chip
2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), 2019Network-on-Chip (NoC) is the communication platform of the data among the processing cores in Multiprocessors System-on-Chip (MPSoC). NoC has become a target to security attacks and by outsourcing design, it can be infected with a malicious Hardware Trojan (HT) to degrades the system performance or leaves a back door for sensitive information leaking ...
Daoud, Luka, Rafla, Nader
openaire +3 more sources
A Study of Black Hole Attacks in Delay Tolerant Network
2021DTN is the latest growing technology having unique characteristics such as longer delays, intermittent connectivity and limited resources or constrained resources. Delay tolerant networks is a store and forward method which delivered the messages to the nearest potential forwarder by replicating copies of the original messages. DTN is created to handle
Puneet, Anamika Chauhan
openaire +2 more sources
On Jamming and Black Hole Attacks in Heterogeneous Wireless Networks
IEEE Transactions on Vehicular Technology, 2019The proliferation of radio-enabled equipment, including sensors, controllers, actuators, mobile handhelds, etc., into the today's heterogeneous wireless network (HWN) has led to the support of different vertical services on-top of the same physical infrastructure. Such an approach increases the potential for enhanced multiplexing gains due to the joint
Anastasia Tsiota+3 more
openaire +2 more sources
Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks
International Conference on Electronics, Communication and Instrumentation (ICECI), 2014In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc.
Anwar Hussain, Mozmin Ahmed
openaire +2 more sources
Black Hole Search with Tokens in Interconnected Networks
2009We study the Black Hole search problem using mobile agents in three interconnected network topologies: hypercube, torus and complete network. We do so without relying on local storage. Instead we use a less-demanding and less-expensive token mechanism.
openaire +2 more sources
Detection of Black Hole Attack in Delay-Tolerant Network
2019In spite of modernization of humanity, in emergency situations like after any natural calamity our infrastructure-based network backbone gets affected first. Disaster relief volunteers face the immense pain to set up a communication system, due to the failure of telecommunication infrastructure and long-standing power.
Rohan Dutta+6 more
openaire +2 more sources
Black Hole Attack Detection in Wireless Sensor Networks
WSN has come as a useful technology and has proved to be a motivational force for new technology that is Internet of Things (IoT). Due to its characteristics limitations, security is one of key challenge for the performance of Wireless sensor networks.Mandeep Kumar, Jahid Ali
openaire +1 more source