Detecting black-hole attack in mobile ad hoc networks

  • Bo Sun
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents a general approach for detecting the black-hole attack in mobile ad hoc networks, which are particularly vulnerable to attacks compared to traditional wired networks due to Its mobility and broadcast In nature. In particular, black-hole attacks can be easily deployed by the adversary. To defend against this attack, we devise a nelghborhood-based method to detect whether there exists a black hole attack and a routing recovery protocol to set up a correct path to the true destination. Our methods have the remarkable advantage that the number of encryption/decryption operations for authentication is much reduced compared to those methods completely relying on cryptography-based authentication, which can save many system resources (e.g., reduce the energy consumption). Through simulation, we evaluate these methods In terms of packet throughput, routing control overhead, detection probability, false positive probability and false negative probability. Simulation results show that our methods can effectively detect black hole attacks In the sense that detection probability In most cases (the probability that one attacker might be detected) Is above 93%. Meanwhile, It does not introduce much routing control overhead. With the routing recovery mechanism, the packet throughput can be Improved by at least 15% and the false positive probability of the detection approach Is very low (less than 1.7%).

Cite

CITATION STYLE

APA

Bo Sun. (2005). Detecting black-hole attack in mobile ad hoc networks (pp. 490–495). Institution of Engineering and Technology (IET). https://doi.org/10.1049/cp:20030303

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free