In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated problem than security in other networks, due to open nature and lack of infrastructure of such networks. This book is based on Black Hole attack. This attack node first invades into the multicast forwarding group. It then absorbs all the data packets in the network and drops fully or partially in such a way that the destination node does not get the data packets fully. This will affect the packet delivery... Mehr