Computer Science – Cryptography and Security
Scientific paper
2010-02-08
International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 10-16, January 2010, USA
Computer Science
Cryptography and Security
7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500,
Scientific paper
In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node. An intermediate node, which takes part in packets forwarding, may behave maliciously and drop packets which goes through it, instead of forwarding them to the following node. Such behavior is called black hole attack. In this paper, after having specified the black hole attack, a secure mechanism, which consists in checking the good forwarding of packets by an intermediate node, was proposed. The proposed solution avoids the black hole and the cooperative black hole attacks. Evaluation metrics were considered in simulation to show the effectiveness of the suggested solution.
Baadache Abderrahmane
Belmehdi Ali
No associations
LandOfFree
Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-308961