M. B. Yassein, Ismail Hmeidi, Y. Khamayseh, M. Al-Rousan, Danah Arrabi
{"title":"黑洞攻击安全问题、挑战及解决方案","authors":"M. B. Yassein, Ismail Hmeidi, Y. Khamayseh, M. Al-Rousan, Danah Arrabi","doi":"10.5121/CSIT.2018.81815","DOIUrl":null,"url":null,"abstract":"MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly without any centralized management, where each node acts as a packet sender, packet receiver, and a router at the same time. According to the nature of this network, the dynamic topology and the absence of a centralized management cause several security issues and attacks, such as the black hole attack, the wormhole attack, and the impersonation and repudiation attack. In this survey, we are going to introduce the Black Hole attack security issues and some of the detection techniques used to detect the black hole attack. In this kind of attack (black hole attack) the intruders manipulate the normal behavior of the network, by introducing themselves as the node with the shortest path to the destination. Intruders can do a malicious behavior over the network.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET\",\"authors\":\"M. B. Yassein, Ismail Hmeidi, Y. Khamayseh, M. Al-Rousan, Danah Arrabi\",\"doi\":\"10.5121/CSIT.2018.81815\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly without any centralized management, where each node acts as a packet sender, packet receiver, and a router at the same time. According to the nature of this network, the dynamic topology and the absence of a centralized management cause several security issues and attacks, such as the black hole attack, the wormhole attack, and the impersonation and repudiation attack. In this survey, we are going to introduce the Black Hole attack security issues and some of the detection techniques used to detect the black hole attack. In this kind of attack (black hole attack) the intruders manipulate the normal behavior of the network, by introducing themselves as the node with the shortest path to the destination. Intruders can do a malicious behavior over the network.\",\"PeriodicalId\":72673,\"journal\":{\"name\":\"Computer science & information technology\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer science & information technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/CSIT.2018.81815\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer science & information technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/CSIT.2018.81815","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET
MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly without any centralized management, where each node acts as a packet sender, packet receiver, and a router at the same time. According to the nature of this network, the dynamic topology and the absence of a centralized management cause several security issues and attacks, such as the black hole attack, the wormhole attack, and the impersonation and repudiation attack. In this survey, we are going to introduce the Black Hole attack security issues and some of the detection techniques used to detect the black hole attack. In this kind of attack (black hole attack) the intruders manipulate the normal behavior of the network, by introducing themselves as the node with the shortest path to the destination. Intruders can do a malicious behavior over the network.