Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500,

Scientific paper

In wireless ad hoc networks, the absence of any control on packets forwarding, make these networks vulnerable by various deny of service attacks (DoS). A node, in wireless ad hoc network, counts always on intermediate nodes to send these packets to a given destination node. An intermediate node, which takes part in packets forwarding, may behave maliciously and drop packets which goes through it, instead of forwarding them to the following node. Such behavior is called black hole attack. In this paper, after having specified the black hole attack, a secure mechanism, which consists in checking the good forwarding of packets by an intermediate node, was proposed. The proposed solution avoids the black hole and the cooperative black hole attacks. Evaluation metrics were considered in simulation to show the effectiveness of the suggested solution.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-308961

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.