Results 191 to 200 of about 1,052 (226)
Some of the next articles are maybe not open access.
Black hole attack's effect mobile ad-hoc networks (MANET)
2015 International Conference on Advances in Computer Engineering and Applications, 2015Ad-hoc network can be defined as a collection of number of mobile nodes which makes a temporary network. Black hole can be defined as a malicious node which on any request of route replies in an incorrect manner as if it has new route to the goal and then it drops all incoming packets. Loss will be very high if malicious nodes work collectively.
Anjali Sardana +3 more
openaire +1 more source
Black Holes and Loose Connections in a Global Urban Network
The Professional Geographer, 2004This paper introduces the concept of black holes and loose connections in the global urban hierarchy. Black holes are defined as large cities, with a population of over 3 million that are not classified as world cities. The paper draws upon a classification that uses advanced producer services as an indicator of world city status.
openaire +1 more source
Discovery of black holes in complex networks
2015Abstract. Networks are vital in today's world. Design and configuration of networks have made the special considerations necessary for its various aspects such as security, integrity, scalability and cost. Malicious nodes on the network must be identified to enhance the resistance of network.
MİRZAEİ, Alireza +2 more
openaire +1 more source
Detecting black-hole attack in mobile ad hoc networks
5th European Personal Mobile Communications Conference 2003, 2003The paper presents a general approach for detecting black-hole attacks in mobile ad hoc networks, which, due to their mobility and being broadcast in nature, are particularly vulnerable to attacks compared to traditional wired networks. In particular, black-hole attacks can be easily deployed by an adversary.
openaire +1 more source
BLACK HOLE ENTROPY AND AREA QUANTUM ENTANGLEMENT ORIGINATED FROM SPIN NETWORKS
International Journal of Modern Physics A, 2010By making use of the grasping action of the area operator as an antisymmetrizer of the grasped strands in spin network and the Penrose binor identity, an equidistant area spectrum [Formula: see text] is deduced. Utilizing the spectrum to calculate the quantized area of black hole horizon, we recalculate the entropy of black hole H(A) = (8πℏGN)-1kA ln ...
Shao, D. +3 more
openaire +1 more source
Black Hole Attack Detection in Wireless Sensor Networks
WSN has come as a useful technology and has proved to be a motivational force for new technology that is Internet of Things (IoT). Due to its characteristics limitations, security is one of key challenge for the performance of Wireless sensor networks.Mandeep Kumar, Jahid Ali
openaire +1 more source
Black Hole Search with Tokens in Interconnected Networks
2009We study the Black Hole search problem using mobile agents in three interconnected network topologies: hypercube, torus and complete network. We do so without relying on local storage. Instead we use a less-demanding and less-expensive token mechanism.
openaire +1 more source
Detection of Black Hole Attack in Delay-Tolerant Network
2019In spite of modernization of humanity, in emergency situations like after any natural calamity our infrastructure-based network backbone gets affected first. Disaster relief volunteers face the immense pain to set up a communication system, due to the failure of telecommunication infrastructure and long-standing power.
Chandrima Chakrabarti +6 more
openaire +1 more source
Searching for Black-Hole Faults in a Network Using Multiple Agents
2006We consider a fixed communication network where (software) agents can move freely from node to node along the edges. A black hole is a faulty or malicious node in the network such that if an agent enters this node, then it immediately “dies.” We are interested in designing an efficient communication algorithm for the agents to identify all black holes.
Cooper, Colin +2 more
openaire +3 more sources
Mitigation Techniques for Gray Hole and Black Hole Attacks in Wireless Mesh Network
2016Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain.
null Geetanjali Rathee +1 more
openaire +1 more source

