Security

An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks

Download Now Free registration required

Executive Summary

The authors propose an Encrypted Verification Method (EVM) that effectively detects a black hole attack. A detection node that receives an RREP from a suspicious node sends an encrypted verification message directly to destination along the path included in the RREP for verification. The approach not only pins down the black hole nodes, but also reduces control over-head significantly. They prove by resorting to simulation that EVM is highly dependable against the black hole attack.

  • Format: PDF
  • Size: 307.08 KB