期刊名称:International Journal of Security and Its Applications
印刷版ISSN:1738-9976
出版年度:2013
卷号:7
期号:6
页码:1-10
DOI:10.14257/ijsia.2013.7.6.01
出版社:SERSC
摘要:A black hole attack is one of the most serious attacks in mobile ad hoc networks. A malicious node can act as if it has a valid route to a destination and then respond with a false Route Reply (RREP) message to the source, when it receives a Route Request (RREQ). Then the malicious node absorbs data packets destined for the destination. We propose an Encrypted Verification Method (EVM) that effectively detects a black hole attack. It takes two steps. First, every node examines its neighbors by inspecting their data transmission behaviors. Second, a detection node that receives an RREP from the suspicious node sends an encrypted verification message directly to the destination along the path included in the RREP for verification. The approach not only pins down the black hole nodes, but also reduces control overhead significantly. We prove by resorting to simulation that the EVM is highly dependable against the black hole attack.