Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: A survey of black hole attacks in wireless mobile ad hoc networks | Tseng et al. Human-centric Computing and Information Sciences 2011 1 4 http content 1 1 4 ũ Human-centric Computing and Information Sciences a SpringerOpen Journal RESEARCH Open Access A survey of black hole attacks in wireless mobile ad hoc networks Fan-Hsun Tseng 1 Li-Der Chou1 and Han-Chieh Chao2 3 4 Correspondence hcc@ 2Department of Electronic Engineering National Ilan University Taiwan Full list of author information is available at the end of the article Springer Abstract The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation. Keywords mobile ad hoc networks routing protocols single black hole attack collaborative black hole attack 1. Introduction Wireless mobile ad hoc network or simply MANET throughout this paper is a selfconfiguring network which is composed of several movable user equipment. These mobile nodes communicate with each other without any infrastructure furthermore all of the transmission links are established through wireless medium. According to the communication mode mentioned before. MANET is widely used in military purpose disaster area personal area network and so on 1 . However there are still many open issues about MANETs such as security problem finite transmission bandwidth 2 abusive broadcasting messages 3 reliable data delivery 4 dynamic link establishment 5 .