Reference Hub3
Security and Privacy in Mobile Ad hoc Social Networks

Security and Privacy in Mobile Ad hoc Social Networks

Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi
ISBN13: 9781466646919|ISBN10: 1466646918|EISBN13: 9781466646926
DOI: 10.4018/978-1-4666-4691-9.ch010
Cite Chapter Cite Chapter

MLA

Ferrag, Mohamed Amine, et al. "Security and Privacy in Mobile Ad hoc Social Networks." Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, edited by Danda B. Rawat, et al., IGI Global, 2014, pp. 222-243. https://doi.org/10.4018/978-1-4666-4691-9.ch010

APA

Ferrag, M. A., Nafa, M., & Ghanemi, S. (2014). Security and Privacy in Mobile Ad hoc Social Networks. In D. Rawat, B. Bista, & G. Yan (Eds.), Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (pp. 222-243). IGI Global. https://doi.org/10.4018/978-1-4666-4691-9.ch010

Chicago

Ferrag, Mohamed Amine, Mehdi Nafa, and Salim Ghanemi. "Security and Privacy in Mobile Ad hoc Social Networks." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, edited by Danda B. Rawat, Bhed B. Bista, and Gongjun Yan, 222-243. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4691-9.ch010

Export Reference

Mendeley
Favorite

Abstract

In this chapter, first, the authors briefly introduce the two new systems “MASN-OLSR” (Mobile Ad Hoc Social Networks with OLSR) and “MASN-AODV” (Mobile Ad Hoc Social Networks with AODV). Then they choose wormhole and black hole attack methods, because they are not completely solved, especially in a setting where MASN is used as OLSR or AODV routing protocol. The authors give a definition of the wormhole and black hole attacks on an ad hoc network using OLSR or AODV as routing protocol and then examine the various existing proposals in the literature to overcome this attack. With an analysis of these methods, they then determine the advantages and disadvantages of each of these new systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.