Results 271 to 280 of about 238,447 (346)
Some of the next articles are maybe not open access.

Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET

International Conference on Computing Communication and Networking Technologies, 2019
Ad hoc network is sensitive to attacks because it has temporary nature and frequently recognized insecure environment. Both Ad hoc On-demand Distance Vector (AODV) and Ad hoc On-demand Multipath Distance vector (AOMDV) routing protocols have the strategy
Sazzat Hossain   +5 more
semanticscholar   +1 more source

Black hole search in common interconnection networks

Networks, 2006
AbstractMobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that destroys incoming agents without leaving any trace. To determine the location of such a harmful host is a dangerous but crucial task, called black hole search.
DOBREV STEFAN   +5 more
openaire   +3 more sources

Searching for a Black Hole in Tree Networks

2005
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous tree network, assuming an upper bound on the time of any edge traversal by an agent.
Jurek Czyzowicz   +3 more
openaire   +1 more source

Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks

International Conference on Electronics, Communication and Instrumentation (ICECI), 2014
In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc.
Mozmin Ahmed, Md. Anwar Hussain
openaire   +1 more source

Black Holes and Loose Connections in a Global Urban Network

The Professional Geographer, 2004
This paper introduces the concept of black holes and loose connections in the global urban hierarchy. Black holes are defined as large cities, with a population of over 3 million that are not classified as world cities. The paper draws upon a classification that uses advanced producer services as an indicator of world city status.
openaire   +1 more source

Searching for Black-Hole Faults in a Network Using Multiple Agents

2006
We consider a fixed communication network where (software) agents can move freely from node to node along the edges. A black hole is a faulty or malicious node in the network such that if an agent enters this node, then it immediately “dies.” We are interested in designing an efficient communication algorithm for the agents to identify all black holes.
Cooper, Colin   +2 more
openaire   +3 more sources

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2008
In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian ...
Aikaterini Mitrokotsa   +2 more
semanticscholar   +1 more source

Black hole attack in mobile Ad Hoc networks

Proceedings of the 42nd annual Southeast regional conference, 2004
The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header.
Mohammad Al-Shurman   +2 more
openaire   +1 more source

Analysis of Black Hole Router Attack in Network-on-Chip

2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), 2019
Network-on-Chip (NoC) is the communication platform of the data among the processing cores in Multiprocessors System-on-Chip (MPSoC). NoC has become a target to security attacks and by outsourcing design, it can be infected with a malicious Hardware Trojan (HT) to degrades the system performance or leaves a back door for sensitive information leaking ...
Daoud, Luka, Rafla, Nader
openaire   +2 more sources

Home - About - Disclaimer - Privacy