26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
DOI: 10.1109/icdcs.2006.25
|View full text |Cite
|
Sign up to set email alerts
|

Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search

Abstract: In this paper we consider a dangerous process located at a node of a network (called

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…Most of the existing work deals with the black hole search problem for a single black hole [9,10,15,16,17,18,19,20,21,22,23,27,32,33,34]. Some work has been done for multiple black holes in [8,35], although both of these papers use the synchronous model, as do some of the single black hole papers [9,10,33,34].…”
Section: Black Hole Search -A Classification Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the existing work deals with the black hole search problem for a single black hole [9,10,15,16,17,18,19,20,21,22,23,27,32,33,34]. Some work has been done for multiple black holes in [8,35], although both of these papers use the synchronous model, as do some of the single black hole papers [9,10,33,34].…”
Section: Black Hole Search -A Classification Reviewmentioning
confidence: 99%
“…In [15,20,21], Dobrev et al investigate the black hole search problem for two agents with a map and whiteboard searching for a single black hole. In [20], authors present a search protocol that improves the bounds from the worst case lower bound of agents moves to agents moves, where is the diameter of the network.…”
Section: B Synchronous Modelmentioning
confidence: 99%
“…A very simple algorithm that works on any topology (a-priori known by the agents) is shown in [27]. The algorithm, based on the pre-computation of an open vertex cover by cycles of the network, uses the optimal number of agents (two); its cost (number of moves) depends on the choice of the cover and it is optimal for several classes of networks.…”
Section: Impact Of Knowledgementioning
confidence: 99%
“…The computational issues related to the presence of a harmful agent have been explored in the context of intruder capture and network decontamination; in the case of harmful host, the focus has been on the black hole (BH), a node that disposes of any incoming agent without leaving any observable trace of this destruction [2,3,5,6,7,8,9,10,13]. In this paper, we continue the investigation of the black hole search problem.…”
Section: Introductionmentioning
confidence: 99%
“…The computability and complexity of BHS depend on a variety of factors, first and foremost on whether the system is asynchronous [5,6,7,8,9] or synchronous [2,4,3,13]. Indeed the nature of the problem changes drastically and dramatically.…”
Section: Introductionmentioning
confidence: 99%