2006
DOI: 10.1007/s00446-006-0154-y
|View full text |Cite
|
Sign up to set email alerts
|

Searching for a black hole in arbitrary networks: optimal mobile agents protocols

Abstract: Consider a networked environment, supporting mobile agents, where there is a black hole: a harmful host that disposes of visiting agents upon their arrival, leaving no observable trace of such a destruction. The black hole search problem is the one of assembling a team of asynchronous mobile agents, executing the same protocol and communicating by means of whiteboards, to successfully identify the location of the black hole; we are concerned with solutions that are generic (i.e., topology-independent). We esta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
102
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 84 publications
(102 citation statements)
references
References 41 publications
0
102
0
Order By: Relevance
“…The computational issues related to the presence of a harmful agent have been explored in the context of intruder capture and network decontamination; in the case of harmful host, the focus has been on the black hole (BH), a node that disposes of any incoming agent without leaving any observable trace of this destruction [2,3,5,6,7,8,9,10,13]. In this paper, we continue the investigation of the black hole search problem.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The computational issues related to the presence of a harmful agent have been explored in the context of intruder capture and network decontamination; in the case of harmful host, the focus has been on the black hole (BH), a node that disposes of any incoming agent without leaving any observable trace of this destruction [2,3,5,6,7,8,9,10,13]. In this paper, we continue the investigation of the black hole search problem.…”
Section: Introductionmentioning
confidence: 99%
“…The computability and complexity of BHS depend on a variety of factors, first and foremost on whether the system is asynchronous [5,6,7,8,9] or synchronous [2,4,3,13]. Indeed the nature of the problem changes drastically and dramatically.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The black hole search was studied in [3,4,5] under the scenario of totally asynchronous networks, that is, without assuming any bound on the ratio of the times of two different edge traversals. The authors considered the case of two agents and one black hole.…”
Section: Introductionmentioning
confidence: 99%
“…However, Sense of Direction is more general and can be used in ways our construction cannot (e.g. avoiding entering a node -see [15]. )…”
mentioning
confidence: 99%