Reference Hub1
Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems

Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems

Hicham Zougagh, Noureddine Idboufker, Rida Zoubairi, Rachid El Ayachi
Copyright: © 2019 |Volume: 15 |Issue: 2 |Pages: 19
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781522564270|DOI: 10.4018/IJBDCN.2019070105
Cite Article Cite Article

MLA

Zougagh, Hicham, et al. "Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems." IJBDCN vol.15, no.2 2019: pp.73-91. http://doi.org/10.4018/IJBDCN.2019070105

APA

Zougagh, H., Idboufker, N., Zoubairi, R., & El Ayachi, R. (2019). Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems. International Journal of Business Data Communications and Networking (IJBDCN), 15(2), 73-91. http://doi.org/10.4018/IJBDCN.2019070105

Chicago

Zougagh, Hicham, et al. "Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems," International Journal of Business Data Communications and Networking (IJBDCN) 15, no.2: 73-91. http://doi.org/10.4018/IJBDCN.2019070105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In a mobile ad hoc network, a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. The performance of a mobile ad hoc network is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of these routing protocols is optimized link state routing protocol which assumes that all nodes are trusted. However, in a hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. Without having any control on packet forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. Therefore, in this article, the authors propose a new technique for the selection of multipoint relays whose aims to provide each node the ability to select alternative paths in order to reach any destination two hops away.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.