Results 271 to 280 of about 238,447 (346)
Some of the next articles are maybe not open access.
International Conference on Computing Communication and Networking Technologies, 2019
Ad hoc network is sensitive to attacks because it has temporary nature and frequently recognized insecure environment. Both Ad hoc On-demand Distance Vector (AODV) and Ad hoc On-demand Multipath Distance vector (AOMDV) routing protocols have the strategy
Sazzat Hossain +5 more
semanticscholar +1 more source
Ad hoc network is sensitive to attacks because it has temporary nature and frequently recognized insecure environment. Both Ad hoc On-demand Distance Vector (AODV) and Ad hoc On-demand Multipath Distance vector (AOMDV) routing protocols have the strategy
Sazzat Hossain +5 more
semanticscholar +1 more source
Black hole search in common interconnection networks
Networks, 2006AbstractMobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that destroys incoming agents without leaving any trace. To determine the location of such a harmful host is a dangerous but crucial task, called black hole search.
DOBREV STEFAN +5 more
openaire +3 more sources
Searching for a Black Hole in Tree Networks
2005A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the task of locating a black hole in a (partially) synchronous tree network, assuming an upper bound on the time of any edge traversal by an agent.
Jurek Czyzowicz +3 more
openaire +1 more source
Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks
International Conference on Electronics, Communication and Instrumentation (ICECI), 2014In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc.
Mozmin Ahmed, Md. Anwar Hussain
openaire +1 more source
Black Holes and Loose Connections in a Global Urban Network
The Professional Geographer, 2004This paper introduces the concept of black holes and loose connections in the global urban hierarchy. Black holes are defined as large cities, with a population of over 3 million that are not classified as world cities. The paper draws upon a classification that uses advanced producer services as an indicator of world city status.
openaire +1 more source
Searching for Black-Hole Faults in a Network Using Multiple Agents
2006We consider a fixed communication network where (software) agents can move freely from node to node along the edges. A black hole is a faulty or malicious node in the network such that if an agent enters this node, then it immediately “dies.” We are interested in designing an efficient communication algorithm for the agents to identify all black holes.
Cooper, Colin +2 more
openaire +3 more sources
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2008In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian ...
Aikaterini Mitrokotsa +2 more
semanticscholar +1 more source
Black hole attack in mobile Ad Hoc networks
Proceedings of the 42nd annual Southeast regional conference, 2004The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header.
Mohammad Al-Shurman +2 more
openaire +1 more source
Analysis of Black Hole Router Attack in Network-on-Chip
2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), 2019Network-on-Chip (NoC) is the communication platform of the data among the processing cores in Multiprocessors System-on-Chip (MPSoC). NoC has become a target to security attacks and by outsourcing design, it can be infected with a malicious Hardware Trojan (HT) to degrades the system performance or leaves a back door for sensitive information leaking ...
Daoud, Luka, Rafla, Nader
openaire +2 more sources

