Abstract:
This paper presents a survey of current methods of detecting black hole attack against ad hoc on-demand distance vector routing protocol in mobile ad hoc networks. In a b...Show MoreMetadata
Abstract:
This paper presents a survey of current methods of detecting black hole attack against ad hoc on-demand distance vector routing protocol in mobile ad hoc networks. In a black hole attack, a malicious node answers each route request with a fake reply claiming to have the shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. Seven detection methods are described in this paper, and their strengths and weaknesses discussed.
Published in: 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies
Date of Conference: 18-20 November 2007
Date Added to IEEE Xplore: 15 August 2008
ISBN Information: