Abstract
In this paper, we consider the specific case of a black-hole attack in ad-hoc networks caused by an incorrect route reply from an intermediate node. As a solution to this problem, we propose a scheme based on a one-way hash chain mechanism and Further-Request/Further-Reply exchange. We prove the effectiveness of the scheme in terms of security and its efficiency in terms of network performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hu, Y.C., Johnson, D., Perrig, A.: Wormhole Attacks in Wireless Networks. IEEE Journal of Selected Area in Communication (2005)
Perrig, A., Hu, Y.C., Johnson, D.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: ACM Workshop on Wireless Security (2003)
Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad hoc Networks. IEEE Communication 10(6), 70–75 (2002)
Zapata, M.G., Asokan, N.: Secure Ad-hoc Routing Protocols. In: WiSe 2002. ACM Press, New York (2002)
Al-Shurman, M., Yoo, S.M., Park, S.J.: Blackhole Attack in Mobile Ad Hoc Networks. In: ACMSE 2004 (2004)
Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: EPMCC 2003 (2003)
Animesh, P., Amitabh, M.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks (2003)
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperate Blackhole Attack in Wireless Ad Hoc Networks. In: ICWN 2003 (2003)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: 6th MobiCom, Boston (2000)
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24, 770–772 (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeong, J., Lee, G., Haas, Z.J. (2008). Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_56
Download citation
DOI: https://doi.org/10.1007/978-3-540-89524-4_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89523-7
Online ISBN: 978-3-540-89524-4
eBook Packages: Computer ScienceComputer Science (R0)