|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
 
 
International Journal of Innovation and Scientific Research
ISSN: 2351-8014
 
 
Saturday 22 September 2018

About IJISR

News

Submission

Downloads

Archives

Custom Search

Contact

Connect with IJISR

   
 
 
 

Securing Ad Hoc Networks: Trust Systems and Replicas Detection


Volume 9, Issue 1, September 2014, Pages 156–166

 Securing Ad Hoc Networks: Trust Systems and Replicas Detection

Brahim IDHAJOUB, Mohammed Erritali, and Mohammed Fakir

Original language: English

Received 18 July 2014

Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


In mobile Ad-Hoc networks, each node of the network must contribute in the process of communication and routing. However, this contribution can expose the network to several types of attackers. The security of mobile ad hoc networks is an open research topic and a major in terms of their vulnerability to various attacks, such as black hole, Sybil ... etc. In this article, we analyze the attack black hole (black hole) in ad hoc networks using as AODV routing protocol. In a black hole attack, a malicious node impersonates a legitimate node, manufactures forged responses with a number of high sequence and thus forces the victim node to select it as a relay.
We are interested in a first time to study the impact of dishonest nodes on the network, and then we will simulate black hole attack using two simulator NS2 and OPNET.


Author Keywords: Ad Hoc networks, Black-Hole, Attack, AODV.


How to Cite this Article


Brahim IDHAJOUB, Mohammed Erritali, and Mohammed Fakir, “Securing Ad Hoc Networks: Trust Systems and Replicas Detection,” International Journal of Innovation and Scientific Research, vol. 9, no. 1, pp. 156–166, September 2014.