Volume 9, Issue 1, September 2014, Pages 156–166
Brahim IDHAJOUB1, Mohammed Erritali2, and Mohammed Fakir3
1 TIAD laboratory, Computer Sciences Department, Faculty of Sciences and Techniques, Sultan Moulay Slimane University, Beni-Mellal, BP: 523, Morocco
2 Faculty of Sciences and Technology, Sultan Moulay Slimane University, Beni Mellal, Morocco
3 TIAD laboratory, Computer Sciences Department, Faculty of Sciences and Techniques, Sultan Moulay Slimane University, Beni-Mellal, BP: 523, Morocco
Original language: English
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
In mobile Ad-Hoc networks, each node of the network must contribute in the process of communication and routing. However, this contribution can expose the network to several types of attackers. The security of mobile ad hoc networks is an open research topic and a major in terms of their vulnerability to various attacks, such as black hole, Sybil ... etc. In this article, we analyze the attack black hole (black hole) in ad hoc networks using as AODV routing protocol. In a black hole attack, a malicious node impersonates a legitimate node, manufactures forged responses with a number of high sequence and thus forces the victim node to select it as a relay.
We are interested in a first time to study the impact of dishonest nodes on the network, and then we will simulate black hole attack using two simulator NS2 and OPNET.
Author Keywords: Ad Hoc networks, Black-Hole, Attack, AODV.
Brahim IDHAJOUB1, Mohammed Erritali2, and Mohammed Fakir3
1 TIAD laboratory, Computer Sciences Department, Faculty of Sciences and Techniques, Sultan Moulay Slimane University, Beni-Mellal, BP: 523, Morocco
2 Faculty of Sciences and Technology, Sultan Moulay Slimane University, Beni Mellal, Morocco
3 TIAD laboratory, Computer Sciences Department, Faculty of Sciences and Techniques, Sultan Moulay Slimane University, Beni-Mellal, BP: 523, Morocco
Original language: English
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
In mobile Ad-Hoc networks, each node of the network must contribute in the process of communication and routing. However, this contribution can expose the network to several types of attackers. The security of mobile ad hoc networks is an open research topic and a major in terms of their vulnerability to various attacks, such as black hole, Sybil ... etc. In this article, we analyze the attack black hole (black hole) in ad hoc networks using as AODV routing protocol. In a black hole attack, a malicious node impersonates a legitimate node, manufactures forged responses with a number of high sequence and thus forces the victim node to select it as a relay.
We are interested in a first time to study the impact of dishonest nodes on the network, and then we will simulate black hole attack using two simulator NS2 and OPNET.
Author Keywords: Ad Hoc networks, Black-Hole, Attack, AODV.
How to Cite this Article
Brahim IDHAJOUB, Mohammed Erritali, and Mohammed Fakir, “Securing Ad Hoc Networks: Trust Systems and Replicas Detection,” International Journal of Innovation and Scientific Research, vol. 9, no. 1, pp. 156–166, September 2014.