Black Hole and Mobile Ad Hoc Network (MANET): A Simple Logical Solution

被引:0
|
作者
Aljumah, Abdullah [1 ]
Ahamad, Tariq [1 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj, Saudi Arabia
来源
PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016) | 2016年
关键词
ad hoc; black hole;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An ad hoc network is a temporary network for a specified work. Even after ensuring security, there are many other security threats that resist its growth and uses. Modern mobile gadgets are capable of creating economical, reliable, dynamic and self configuring networks but their main capabilities SAAS, PAAS, IAAS and wireless communication are being exploited and resisted by Ad Hoc Networks. The major issue with these networks is the security and that is what is exploited by the modern industry and determines its level of security and makes it easier to attack. The main aim of this research is to understand the core elements of Ad Hoc Networks and its routing protocols before, during and after network attacks. Black hole is one of the most serious issue with this network as well and in this research article we will discuss how to make it more reliable and more attack resistant network.
引用
收藏
页码:9 / 12
页数:4
相关论文
共 50 条
  • [1] Solution to the black hole problem in mobile Ad-Hoc network
    Makki, S
    Pissinou, N
    Huang, H
    5th World Wireless Congress, Proceedings, 2004, : 508 - 512
  • [2] A Novel Taxonomy of Black-hole Attack Detection Techniques in Mobile Ad-Hoc Network (MANET)
    Sherif, Ahmed
    Elsabrouty, Maha
    Shoukry, Amin
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 346 - 352
  • [3] Black Hole Attack's Effect Mobile Ad-hoc Networks (MANET)
    Sardana, Anjali
    Saini, Akanksha
    Bedwal, Tushina
    Tayal, Radhika
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 966 - 970
  • [4] Black Hole Attack Prevention in Mobile Ad-hoc Network (MANET) Using Ant Colony Optimization Technique
    Khan, Dost Muhammad
    Aslam, Talal
    Akhtar, Nadeem
    Qadri, Salman
    Khan, Noman Ameer
    Rabbani, Imran Mujaddid
    Aslam, Muhammad
    INFORMATION TECHNOLOGY AND CONTROL, 2020, 49 (03): : 308 - 319
  • [5] BLACK HOLE ATTACK MODEL AND SIMULATION FOR MOBILE AD HOC NETWORK
    Ding, Yuanming
    Qu, Hao
    Li, Guang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2015, 11 (01): : 203 - 211
  • [6] An Analytical Approach for Detection of Gray Hole Attack in Mobile Ad-hoc Network (MANET)
    Shukla, Parineet D.
    Kanthe, Ashok M.
    Simunic, Dina
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 78 - 82
  • [7] A Survey over Black hole Attack Detection in Mobile Ad hoc Network
    Behzad, Shahram
    Jamali, Shahram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 44 - 51
  • [8] Mobile Ad-Hoc Network (MANET) for Disaster Management
    Jadhav, S. S.
    Kulkarni, A. V.
    Menon, Radhika
    2014 ELEVENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2014,
  • [9] Bandwidth estimation in Mobile Ad-hoc Network (MANET)
    Ali, Rabia
    Zafar, Fareeha
    International Journal of Computer Science Issues, 2011, 8 (5 5-1): : 331 - 337
  • [10] Continuous authentication consoles in mobile ad hoc network (MANET)
    Ramkumar, D.
    Annadurai, C.
    Nirmaladevi, K.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S7777 - S7786