Security against black hole attack in wireless sensor network-a review

BK Mishra, MC Nikam… - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
A wireless sensor network consists of geologically distributed autonomous sensors to
monitor and control over physical or environmental conditions, like temperature, sound …

Computing without communicating: Ring exploration by asynchronous oblivious robots

P Flocchini, D Ilcinkas, A Pelc, N Santoro - Algorithmica, 2013 - Springer
We consider the problem of exploring an anonymous unoriented ring by a team of k
identical, oblivious, asynchronous mobile robots that can view the environment but cannot …

Distributed exploration of dynamic rings

G Di Luna, S Dobrev, P Flocchini, N Santoro - Distributed Computing, 2020 - Springer
In the graph exploration problem, a team of mobile computational entities, called agents,
arbitrarily positioned at some nodes of a graph, must cooperate so that each node is …

BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks

S Misra, K Bhattarai, G Xue - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
Black hole attacks occur when an adversary captures and re-programs a set of nodes in the
network to block/drop the packets they receive/generate instead of forwarding them towards …

Rendezvous of mobile agents in unknown graphs with faulty links

J Chalopin, S Das, N Santoro - International Symposium on Distributed …, 2007 - Springer
A group of identical mobile agents moving asynchronously among the nodes of an
anonymous network have to gather together in a single node of the graph. This problem …

Searching for black holes in subways

P Flocchini, M Kellett, PC Mason, N Santoro - Theory of Computing …, 2012 - Springer
Current mobile agent algorithms for map** faults in computer networks assume that the
network is static. However, for large classes of highly dynamic networks (eg, wireless mobile …

Live exploration of dynamic rings

GA Di Luna, S Dobrev, P Flocchini… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Almost all the vast literature on graph exploration assumes that the graph is static: its
topology does not change during the exploration, except for occasional faults. To date, very …

[PDF][PDF] Mobile agents in distributed computing: Network exploration

S Das - Bulletin of EATCS, 2013 - eatcs.org
One of the recent paradigms in networked distributed computing is the use of mobile agents.
Mobile agents are software robots that can autonomously migrate from node to node within …

Exploring an unknown dangerous graph using tokens

S Dobrev, P Flocchini, R Královič, N Santoro - Theoretical Computer …, 2013 - Elsevier
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the
graph topology and starting from the same node, the team must explore the graph. This …

Efficient and consistent flow update for software defined networks

KR Wu, JM Liang, SC Lee… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Software defined network (SDN) provides flexible and scalable routing by separating control
plane and data plane. With centralized control, SDN has been widely used in traffic …