Download Now Free registration required
The authors propose an Encrypted Verification Method (EVM) that effectively detects a black hole attack. A detection node that receives an RREP from a suspicious node sends an encrypted verification message directly to destination along the path included in the RREP for verification. The approach not only pins down the black hole nodes, but also reduces control over-head significantly. They prove by resorting to simulation that EVM is highly dependable against the black hole attack.
- Format: PDF
- Size: 307.08 KB