Loading...
Search for: hash-chains
0.01 seconds

    Preventing black hole attack in AODV through use of hash chain

    , Article 2011 19th Iranian Conference on Electrical Engineering, ICEE 2011, 17 May 2011 through 19 May 2011 ; May , 2011 , Page(s): 1 ; 9789644634284 (ISBN) Shoja, M. K ; Taheri, H ; Vakilinia, S ; Sharif University of Technology
    2011
    Abstract
    Wireless ad hoc networks are vulnerable against many types of attacks including black hole. In this paper we investigate the effect of this attack on ad hoc networks. Furthermore, we use hash chain to prevent this type of attack in a network that uses AODV as a routing protocol and results of applying this method has been investigated. Simulation results using OPNET simulator indicates that packet delivery ratio, in the presence of malicious nodes, reduces remarkably and proposed approach can prevent the effect of black hole attacks  

    2D Hash Chain robust Random Key Distribution scheme

    , Article Information Processing Letters ; Volume 116, Issue 5 , 2016 , Pages 367-372 ; 00200190 (ISSN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    Elsevier  2016
    Abstract
    Many Random Key Distribution (RKD) schemes have been proposed in the literature to enable security applications in Wireless Sensor Networks (WSNs). A main security aspect of RKD schemes is their resistance against node capture attacks, since compromising the sensors and capturing their keys is a common risk in such networks. We propose a new method, based on a 2-Dimensional Hash Chain (2DHC), that can be applied on any RKD scheme to improve their resilience. Our method maintains the flexibility and low cost features of RKD schemes and it doesn't require any special-purpose hardware or extra memory to store keys in the sensors. We demonstrate that our approach significantly increases the...