Secure Routing against Black-hole Attack in Mobile Ad Hoc Networks

B. Sun (USA), K. Wu (Canada), and U.W. Pooch (USA)


Mobile Ad Hoc Networks, Routing Security, Black-holeAttack, Performance


Security problems will become the main obstacle when we deploy an ad hoc network in reality. In this paper, we present two approaches, the Public Key Infrastructure (PKI) based method and the Neighbor Set Detection (NSD) method, to enhance the security of Dynamic Source Rout ing (DSR) under the black-hole attack. The PKI-based approach can provide stringent security protection. How ever, it assumes the existence of a PKI and requires com plicated cryptographic calculations. In contrast, the NSD method does not depend on any existing security mecha nism and does not require any encryption/ decryption op erations, thus saving a lot of system resources. Unlike the PKI-based method, which can completely prevent the net work from using fabricated routing information, the NSD method cannot guarantee accurate detection of an intruder. However, simulation results show that the NSD method is effective in the sense that the probability that one attacker might be detected is above 95% and the probability that a normal node is identiļ¬ed as an attacker is below 1.4%. Simulation studies also demonstrate that both methods can improve network throughput under the black-hole attack.

Important Links:

Go Back