Black hole search in computer networks: State-of-the-art, challenges and future directions
被引:11
|
作者:
Peng, Mengfei
论文数: 0引用数: 0
h-index: 0
机构:
Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, CanadaUniv Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
Peng, Mengfei
[1
]
Shi, Wei
论文数: 0引用数: 0
h-index: 0
机构:
Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, CanadaUniv Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
Shi, Wei
[1
]
Corriveau, Jean-Pierre
论文数: 0引用数: 0
h-index: 0
机构:
Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, CanadaUniv Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
Corriveau, Jean-Pierre
[2
]
Pazzi, Richard
论文数: 0引用数: 0
h-index: 0
机构:
Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, CanadaUniv Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
Pazzi, Richard
[1
]
Wang, Yang
论文数: 0引用数: 0
h-index: 0
机构:
Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen, Peoples R ChinaUniv Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
Wang, Yang
[3
]
机构:
[1] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
Black hole search;
Mobile agents;
Multiple black holes;
Malicious host;
Network diagnosis;
MOBILE AGENTS;
D O I:
10.1016/j.jpdc.2015.10.006
中图分类号:
TP301 [理论、方法];
学科分类号:
081202 ;
摘要:
As the size and use of networks continue to increase, network anomalies and faults are commonplace. Consequently, effective detection of such network issues is crucial for the deployment and use of network based services. In this paper, we focus on one specific severe and pervasive network problem, namely the presence of one or more black holes. A black hole models a network node that is accidentally off-line or in which a process deletes any visiting agent or incoming data upon arrival without leaving any observable trace. Black Hole Search is the process that leverages mobile agents to locate black holes in a fully distributed way. In this paper, we review the state-of-the-art research in this area. We first distinguish between solutions for synchronous and asynchronous networks. We then consider the communication model between agents, their starting locations and the topological knowledge each may hold. We also report on the proposed algorithms with respect to their complexity and correctness. We remark that most existing work addresses locating a single black hole, multiple black hole search being significantly more complex. We not only summarize major results in this area but also briefly touch on other types of malicious hosts. Finally, we identify some open problems for future research. (C) 2015 Elsevier Inc. All rights reserved.
机构:
Indian Inst Technol Kharagpur, Sch Informat Technol, Kharagpur, W Bengal, India
Indian Inst Technol Kharagpur, Dept Agr & Food Engn, Kharagpur, W Bengal, IndiaIndian Inst Technol Kharagpur, Sch Informat Technol, Kharagpur, W Bengal, India
Ojha, Tamoghna
论文数: 引用数:
h-index:
机构:
Misra, Sudip
Raghuwanshi, Narendra Singh
论文数: 0引用数: 0
h-index: 0
机构:
Indian Inst Technol Kharagpur, Dept Agr & Food Engn, Kharagpur, W Bengal, IndiaIndian Inst Technol Kharagpur, Sch Informat Technol, Kharagpur, W Bengal, India