An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks

Download Now
Provided by: Science & Engineering Research Support soCiety (SERSC)
Topic: Security
Format: PDF
A black hole attack is one of the most serious attacks in mobile ad hoc networks. A malicious node can act as if it has a valid route to a destination and then respond with a false Route REPly (RREP) message to the source, when it receives a Route REQuest (RREQ). Then the malicious node absorbs data packets destined for the destination. The authors propose an Encrypted Verification Method (EVM) that effectively detects a black hole attack. It takes two steps. First, every node examines its neighbors by inspecting their data transmission behaviors. Second, a detection node that receives an RREP from the suspicious node sends an encrypted verification message directly to the destination along the path included in the RREP for verification.
Download Now

Find By Topic