Monitoring assisted robust routing in wireless mesh networks
Mobile Networks and Applications
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Bullet-proof verification (BPV) method to detect black hole attack in mobile ad hoc networks
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Secure Video Transmission Against Black Hole Attack in MANETs
International Journal of Business Data Communications and Networking
Hi-index | 0.00 |
A wireless ad hoc network is a collection of mobile nodes with no fixed infrastructure. The absence of central authorization facility in dynamic and distributed environment requirescollaboration among nodes. When a source searches for a route to a destination, an intermediate node can reply with its cached entry. To strengthen correctness of such routing discovery process, we propose a method in which the intermediate node requests its next hop to send a confirmation message to the source. After receiving both route reply and confirmation message, the source determines the validity of path according to its policy. As a result, this strategy discourages malicious nodes from intercepting packets. Simulation results show remarkable improvement in throughput (30% higher delivery ratio and 10% less datatransmission overhead) with moderate increase of control messages.