Black Hole Attack Injection in Ad hoc Networks

  title={Black Hole Attack Injection in Ad hoc Networks},
  author={J. Ruiz and Jesus Friginal and David de-Andr{\'e}s and Pedro Gil},
Ad hoc networks exploit the processing, storage and wireless communication capabilities of mobile devices to create spontaneous and low-cost self-configuring networks. Despite the promises offered by such networks, their industrial exploitation claims for methodologies to assess the level of security provided by resulting solutions. A first step towards that ambitious goal is to study how central elements of ad hoc networks, their routing protocols, behave in absence, but also in presence, of… CONTINUE READING
8 Citations
3 References
Similar Papers


Publications referenced by this paper.

Similar Papers

Loading similar papers…