Bullet-Proof Verification (BPV) method to detect black hole attack in mobile ad hoc networks

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile ad hoc networks are vulnerable to various security attacks due to the fact that a mobile node not only has a freedom of joining or leaving the network but also acts as a router. In this paper, we propose a bullet-proof verification (BPV) method to detect the black hole attack, either single or cooperative, in mobile ad hoc networks. The BPV method consists of two steps: every node first examines suspicious nodes using local neighborhood information and secondly, if a node receives RREP from a suspicious node, it sends an encrypted (bullet-proof) test message to the destination to confirm whether the suspicious node is black hole or not. The two-step approach not only pins down the black hole nodes, but also contributes to reducing control overhead. We prove by resorting to simulation that the BPV can be applied to the AODV without degrading performance notably and also is highly dependable against the black hole attack. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Ahmed, F., Yoon, S., & Oh, H. (2011). Bullet-Proof Verification (BPV) method to detect black hole attack in mobile ad hoc networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6905 LNCS, pp. 435–449). https://doi.org/10.1007/978-3-642-23641-9_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free