Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Hi-index | 0.00 |
In this paper, we consider the specific case of a black-hole attack in ad-hoc networks caused by an incorrect route reply from an intermediate node. As a solution to this problem, we propose a scheme based on a one-way hash chain mechanism and Further-Request/Further-Reply exchange. We prove the effectiveness of the scheme in terms of security and its efficiency in terms of network performance.