Black hole search in dynamic rings

GA Di Luna, P Flocchini, G Prencipe… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
In this paper, we start the investigation of distributed computing by mobile agents in
dangerous dynamic networks. The danger is posed by the presence in the network of a …

Black hole search in computer networks: State-of-the-art, challenges and future directions

M Peng, W Shi, JP Corriveau, R Pazzi… - Journal of Parallel and …, 2016 - Elsevier
As the size and use of networks continue to increase, network anomalies and faults are
commonplace. Consequently, effective detection of such network issues is crucial for the …

Black hole search in dynamic cactus graph

A Bhattacharya, GF Italiano, PS Mandal - International Conference and …, 2024 - Springer
We study the problem of black hole search by a set of mobile agents, where the underlying
graph is a dynamic cactus. A black hole is a dangerous vertex in the graph that eliminates …

Dangerous graphs

E Markou, W Shi - Distributed Computing by Mobile Entities: Current …, 2019 - Springer
Anomalies and faults are inevitable in computer networks, today more than ever before. This
is due to the large scale and dynamic nature of the networks used to process big data and to …

Locating a black hole in a dynamic ring

GA Di Luna, P Flocchini, G Prencipe… - Journal of Parallel and …, 2025 - Elsevier
In networked environments supporting mobile agents, a pressing problem is the presence of
network sites harmful for the agents. In this paper we consider the danger posed by a node …

Black Hole Search in Dynamic Rings: The Scattered Case

GA Di Luna, P Flocchini, G Prencipe… - … on Principles of …, 2023 - iris.uniroma1.it
In this paper we investigate the problem of searching for a black hole in a dynamic graph by
a set of scattered agents (ie, the agents start from arbitrary locations of the graph). The black …

Asynchronous Gathering in a Dangerous Ring

S Dobrev, P Flocchini, G Prencipe, N Santoro - Algorithms, 2023 - mdpi.com
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …

[HTML][HTML] Explore and repair graphs with black holes using mobile entities

M D'Emidio, D Frigioni, A Navarra - Theoretical Computer Science, 2015 - Elsevier
In this paper, we study the problem of mobile entities that synchronously have to explore and
repair a graph with faulty nodes, usually called black-holes, that destroy any entering entity …

Exploring and making safe dangerous networks using mobile entities

M D'Emidio, D Frigioni, A Navarra - Ad-hoc, Mobile, and Wireless Network …, 2013 - Springer
We consider synchronous and mobile entities that have to explore and make safe a network
with faulty nodes, called black-holes, that destroy any entering entity. We are interested in …

[PDF][PDF] Identifying hostile nodes in networks using mobile agents

E Markou - Bulletin of EATCS, 2013 - eatcs.org
In distributed mobile computing environments one of the most pressing concerns is security.
Two are the most important security threats: a malicious mobile process which can move …