Skip to main content

Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks

  • Conference paper
Information Networking. Towards Ubiquitous Networking and Services (ICOIN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5200))

Included in the following conference series:

Abstract

In this paper, we consider the specific case of a black-hole attack in ad-hoc networks caused by an incorrect route reply from an intermediate node. As a solution to this problem, we propose a scheme based on a one-way hash chain mechanism and Further-Request/Further-Reply exchange. We prove the effectiveness of the scheme in terms of security and its efficiency in terms of network performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hu, Y.C., Johnson, D., Perrig, A.: Wormhole Attacks in Wireless Networks. IEEE Journal of Selected Area in Communication (2005)

    Google Scholar 

  2. Perrig, A., Hu, Y.C., Johnson, D.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: ACM Workshop on Wireless Security (2003)

    Google Scholar 

  3. Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad hoc Networks. IEEE Communication 10(6), 70–75 (2002)

    Article  Google Scholar 

  4. Zapata, M.G., Asokan, N.: Secure Ad-hoc Routing Protocols. In: WiSe 2002. ACM Press, New York (2002)

    Google Scholar 

  5. Al-Shurman, M., Yoo, S.M., Park, S.J.: Blackhole Attack in Mobile Ad Hoc Networks. In: ACMSE 2004 (2004)

    Google Scholar 

  6. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: EPMCC 2003 (2003)

    Google Scholar 

  7. Animesh, P., Amitabh, M.: Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks (2003)

    Google Scholar 

  8. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.: Prevention of Cooperate Blackhole Attack in Wireless Ad Hoc Networks. In: ICWN 2003 (2003)

    Google Scholar 

  9. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: 6th MobiCom, Boston (2000)

    Google Scholar 

  10. Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, J., Lee, G., Haas, Z.J. (2008). Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89524-4_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89523-7

  • Online ISBN: 978-3-540-89524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics