Results 41 to 50 of about 633,009 (149)

A Lightweight and Attack Resistant Authenticated Routing Protocol for Mobile Adhoc Networks

open access: yes, 2010
In mobile ad hoc networks, by attacking the corresponding routing protocol, an attacker can easily disturb the operations of the network. For ad hoc networks, till now many secured routing protocols have been proposed which contains some disadvantages ...
Babu, M. Rajesh, Selvan, S.
core   +1 more source

Protector Control PC-AODV-BH in The Ad Hoc Networks

open access: yes, 2016
In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is
Agoujil, S.   +3 more
core   +1 more source

Resilient networking in wireless sensor networks [PDF]

open access: yes, 2010
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities.
Erdene-Ochir, Ochirkhand   +3 more
core   +2 more sources

Synchronized stationary clouds in a static fluid

open access: yes, 2018
The existence of stationary bound states for the hydrodynamic velocity field between two concentric cylinders is established. We argue that rotational motion, together with a trapping mechanism for the associated field, is sufficient to mitigate energy ...
Benone, Carolina L.   +3 more
core   +1 more source

Optimization of Consignment-Store-Based Supply Chain with Black Hole Algorithm

open access: yesComplex, 2017
The globalization of economy and market led to increased networking in the field of manufacturing and services. These manufacturing and service processes including supply chain became more and more complex.
Á. Bányai, T. Bányai, B. Illés
semanticscholar   +1 more source

Searching for a dangerous host: randomized vs. deterministic [PDF]

open access: yesarXiv, 2007
A Black Hole is an harmful host in a network that destroys incoming agents without leaving any trace of such event. The problem of locating the black hole in a network through a team of agent coordinated by a common protocol is usually referred in literature as the Black Hole Search problem (or BHS for brevity) and it is a consolidated research topic ...
arxiv  

Black Hole Search with Finite Automata Scattered in a Synchronous Torus [PDF]

open access: yesarXiv, 2011
We consider the problem of locating a black hole in synchronous anonymous networks using finite state agents. A black hole is a harmful node in the network that destroys any agent visiting that node without leaving any trace. The objective is to locate the black hole without destroying too many agents.
arxiv  

Tight Bounds for Black Hole Search with Scattered Agents in Synchronous Rings [PDF]

open access: yesarXiv, 2011
We study the problem of locating a particularly dangerous node, the so-called black hole in a synchronous anonymous ring network with mobile agents. A black hole is a harmful stationary process residing in a node of the network and destroying destroys all mobile agents visiting that node without leaving any trace.
arxiv  

Home - About - Disclaimer - Privacy