Results 1 - 10
of
290
Searching for Mobile Intruders in a Polygonal Region by a Group of Mobile Searchers
- SIAM JOURNAL ON COMPUTING
"... The problem of searching for mobile intruders in a polygonal region by mobile searchers is considered. A searcher can move continuously inside a polygon holding a flashlight that emits a single ray of light whose direction can be changed continuously. The visibility of a searcher at any time instant ..."
Abstract
-
Cited by 156 (3 self)
- Add to MetaCart
The problem of searching for mobile intruders in a polygonal region by mobile searchers is considered. A searcher can move continuously inside a polygon holding a flashlight that emits a single ray of light whose direction can be changed continuously. The visibility of a searcher at any time
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
"... ABSTRACT: Wireless sensor networks are nowadays widely popular and has become an integral part in the military ..."
Abstract
- Add to MetaCart
ABSTRACT: Wireless sensor networks are nowadays widely popular and has become an integral part in the military
Capture of an Intruder by Mobile Agents
, 2002
"... Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents' s ..."
Abstract
-
Cited by 69 (22 self)
- Add to MetaCart
Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents
A Method of Tracing Intruders by Use of Mobile Agents
, 1999
"... . A network intrusion detection system (IDA) retrieves information related to intrusions from target systems across the network by using mobile agents. Simultaneously, the agents trace the intruders. IDA detects intrusions based on information collected and the route of intrusion. This paper ma ..."
Abstract
-
Cited by 24 (0 self)
- Add to MetaCart
. A network intrusion detection system (IDA) retrieves information related to intrusions from target systems across the network by using mobile agents. Simultaneously, the agents trace the intruders. IDA detects intrusions based on information collected and the route of intrusion. This paper
Multiple Independent Lazy Intruders
"... Abstract—We consider a model of multiple independent intruders that have no ability to share knowledge between each other. We use this model to analyze security in wireless ad-hoc networks, where each intruder has a local control in the network, i.e., he can read and send messages only to his direct ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
direct neighbors. Another application is the mobile ambient calculus where several intruder processes are not able to exchange their knowledge. Both these security problems can be reduced to satisfiability of lazy intruder constraint systems, for a bounded number of steps of the honest agents. However
DETECTION OF INTRUDER NODES IN AUTONOMOUS MOBILE MESH NETWORKS
"... Abstract — In this paper, we describe the Autonomous Mobile mesh network with security. In MANET nodes move from one place to another place in free directions. The movement of the nodes may split the network and form more than one group. In this case communication between two nodes will be disconnec ..."
Abstract
- Add to MetaCart
Abstract — In this paper, we describe the Autonomous Mobile mesh network with security. In MANET nodes move from one place to another place in free directions. The movement of the nodes may split the network and form more than one group. In this case communication between two nodes
Detecting intruders in complex environments with limited range mobile sensors
- Robot Motion and Control 2007, Lecture Notes in Information and Control
"... Summary. This paper examines the problem of detecting intruders in large multiply-connected environments with multiple robots and limited range sensors. We divide the problem into two sub-problems: 1) partitioning of the environment and 2) a new problem called weighted graph clearing. We reduce the ..."
Abstract
-
Cited by 4 (4 self)
- Add to MetaCart
Summary. This paper examines the problem of detecting intruders in large multiply-connected environments with multiple robots and limited range sensors. We divide the problem into two sub-problems: 1) partitioning of the environment and 2) a new problem called weighted graph clearing. We reduce
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
"... An Intrusion Detection System in network fetches the intrusions information from systems by using Mobile Agents aid. Intrusion Detection System detects intrusions based on the collected information and routes the intrusion. The intelligent decisions on communications permit agents to gain their goal ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
An Intrusion Detection System in network fetches the intrusions information from systems by using Mobile Agents aid. Intrusion Detection System detects intrusions based on the collected information and routes the intrusion. The intelligent decisions on communications permit agents to gain
Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks
, 2014
"... Barrier coverage problem in emerging mobile sensor networks has been an interesting research issue due to many related real-life applications. Existing solutions are mainly con-cerned with deciding one-time movement for individual sensors to construct as many barriers as possible, which may not be ..."
Abstract
- Add to MetaCart
periodically by mobile sensors. Based on the insight from PMS, we then propose a coordinated sensor patrolling (CSP) algorithm to further improve the barrier coverage, where each sensor’s current movement strategy is derived from the information of intruder arrivals in the past. By jointly exploiting sensor
Robust sensor self-initialization Whispering to avoid intruders
"... Abstract. Wireless Sensor Networks (WSN) are becoming bigger and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solution were already proposed for mobile ad-hoc networks but they ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
Abstract. Wireless Sensor Networks (WSN) are becoming bigger and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solution were already proposed for mobile ad-hoc networks
Results 1 - 10
of
290