원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.6 No.2
2012.04
pp.179-184
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
We propose an Encrypted Verification Method (EVM) that effectively detects a black hole attack. A detection node that receives an RREP from a suspicious node sends an encrypted verification message directly to destination along the path included in the RREP for verification. The approach not only pins down the black hole nodes, but also reduces control overhead significantly. We prove by resorting to simulation that EVM is highly dependable against the black hole attack.
목차
Abstract
1. Introduction
2. Encrypted Verification Method (EVM)
2.1. Identification of Suspicious Node
2.2. Encrypted Verification Process
3. Performance Evaluation
4. Concluding Remarks
Acknowledgement
References
1. Introduction
2. Encrypted Verification Method (EVM)
2.1. Identification of Suspicious Node
2.2. Encrypted Verification Process
3. Performance Evaluation
4. Concluding Remarks
Acknowledgement
References
저자정보
참고문헌
자료제공 : 네이버학술정보
