Article ID Journal Published Year Pages File Type
452888 Computer Networks 2014 12 Pages PDF
Abstract

In multi-hop wireless ad hoc networks, nodes not in direct range rely on intermediate nodes to communicate. In order to preserve its limited resources or to launch a DoS attack, an intermediate node drops packets going through it instead to forward them to its successor. In this paper, we deal with this misbehavior called black hole attack, and we propose an authenticated end-to-end acknowledgment based approach in order to check the correct forwarding of packets by intermediate nodes. Our approach detects the black hole conducted in simple or cooperative manner, the modification and the replay of messages attacks. Through simulation using OPNET simulator, we show the detection efficiency and evaluate the performance of our approach in both proactive and reactive routing based networks in terms of end-to-end delay and network load. Also, we compare the approach we propose with 2-hop ACK and the watchdog approaches in terms of detection ratio, delivery ratio and additional overhead.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,