Results 161 to 170 of about 413,930 (174)
Some of the next articles are maybe not open access.

Black hole attack in mobile Ad Hoc networks

Proceedings of the 42nd annual Southeast regional conference, 2004
The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header.
Seungjin Park   +2 more
openaire   +2 more sources

Black Holes and Loose Connections in a Global Urban Network

The Professional Geographer, 2004
This paper introduces the concept of black holes and loose connections in the global urban hierarchy. Black holes are defined as large cities, with a population of over 3 million that are not classified as world cities. The paper draws upon a classification that uses advanced producer services as an indicator of world city status.
openaire   +3 more sources

Searching for Black-Hole Faults in a Network Using Multiple Agents

2006
We consider a fixed communication network where (software) agents can move freely from node to node along the edges. A black hole is a faulty or malicious node in the network such that if an agent enters this node, then it immediately “dies.” We are interested in designing an efficient communication algorithm for the agents to identify all black holes.
Cooper, Colin   +2 more
openaire   +5 more sources

Analysis of Black Hole Router Attack in Network-on-Chip

2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), 2019
Network-on-Chip (NoC) is the communication platform of the data among the processing cores in Multiprocessors System-on-Chip (MPSoC). NoC has become a target to security attacks and by outsourcing design, it can be infected with a malicious Hardware Trojan (HT) to degrades the system performance or leaves a back door for sensitive information leaking ...
Daoud, Luka, Rafla, Nader
openaire   +3 more sources

A Study of Black Hole Attacks in Delay Tolerant Network

2021
DTN is the latest growing technology having unique characteristics such as longer delays, intermittent connectivity and limited resources or constrained resources. Delay tolerant networks is a store and forward method which delivered the messages to the nearest potential forwarder by replicating copies of the original messages. DTN is created to handle
Puneet, Anamika Chauhan
openaire   +2 more sources

On Jamming and Black Hole Attacks in Heterogeneous Wireless Networks

IEEE Transactions on Vehicular Technology, 2019
The proliferation of radio-enabled equipment, including sensors, controllers, actuators, mobile handhelds, etc., into the today's heterogeneous wireless network (HWN) has led to the support of different vertical services on-top of the same physical infrastructure. Such an approach increases the potential for enhanced multiplexing gains due to the joint
Anastasia Tsiota   +3 more
openaire   +2 more sources

Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks

International Conference on Electronics, Communication and Instrumentation (ICECI), 2014
In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc.
Anwar Hussain, Mozmin Ahmed
openaire   +2 more sources

Black Hole Search with Tokens in Interconnected Networks

2009
We study the Black Hole search problem using mobile agents in three interconnected network topologies: hypercube, torus and complete network. We do so without relying on local storage. Instead we use a less-demanding and less-expensive token mechanism.
openaire   +2 more sources

Detection of Black Hole Attack in Delay-Tolerant Network

2019
In spite of modernization of humanity, in emergency situations like after any natural calamity our infrastructure-based network backbone gets affected first. Disaster relief volunteers face the immense pain to set up a communication system, due to the failure of telecommunication infrastructure and long-standing power.
Rohan Dutta   +6 more
openaire   +2 more sources

Black Hole Attack Detection in Wireless Sensor Networks

WSN has come as a useful technology and has proved to be a motivational force for new technology that is Internet of Things (IoT). Due to its characteristics limitations, security is one of key challenge for the performance of Wireless sensor networks.
Mandeep Kumar, Jahid Ali
openaire   +1 more source

Home - About - Disclaimer - Privacy