2006
DOI: 10.1002/net.20095
|View full text |Cite
|
Sign up to set email alerts
|

Black hole search in common interconnection networks

Abstract: Mobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that destroys incoming agents without leaving any trace. To determine the location of such a harmful host is a dangerous but crucial task, called black hole search. The most important parameter for a solution strategy is the number of agents it requires (the size); the other parameter of interest is the total number of moves performed by the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
59
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 50 publications
(59 citation statements)
references
References 24 publications
0
59
0
Order By: Relevance
“…This black hole search problem has been originally studied in ring networks [12] and has been extensively investigated in various settings since then (e.g., see [4,6,8,10,13,14,19,24]). In order to locate the black hole, some of the agents of the team will necessarily have to enter the dangerous site.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This black hole search problem has been originally studied in ring networks [12] and has been extensively investigated in various settings since then (e.g., see [4,6,8,10,13,14,19,24]). In order to locate the black hole, some of the agents of the team will necessarily have to enter the dangerous site.…”
Section: Related Workmentioning
confidence: 99%
“…In [10], arbitrary topologies have been considered and asymptotically optimal location algorithms have been proposed under a variety of assumptions on the agents' knowledge (knowledge of the topology, presence of sense of direction). An improved algorithm when the topology is known has been described in [11], while optimal algorithms for common interconnection networks have been studied in [8]. In [19] the effects of knowledge of incoming link on the optimal team size has been studied and lower bounds provided.…”
Section: Related Workmentioning
confidence: 99%
“…Because of the asynchrony, the agents can not distinguish between a slow node and the BH; as a consequence, it is impossible to find the Black Hole if the size of the ring is not known [5]. Thus, we will assume that the agents have such a knowledge.…”
Section: The Model and Basic Observationsmentioning
confidence: 99%
“…The computational issues related to the presence of a harmful agent have been explored in the context of intruder capture and network decontamination; in the case of harmful host, the focus has been on the black hole (BH), a node that disposes of any incoming agent without leaving any observable trace of this destruction [2,3,5,6,7,8,9,10,13]. In this paper, we continue the investigation of the black hole search problem.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation