A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET
()
Currently unavailable
Currently unavailable
About this ebook
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
- Elaborates on the basics of wireless networks, MANETs
- Explains the significance behind the need of wireless networks and MANET security
- Understand MANET routing protocols, namely the ADOV method
Elahe Fazeldehkordi
E. Fazeldehkordi received her Associate’s Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.
Related to A Study of Black Hole Attack Solutions
Related ebooks
Data Communication and Networking: For Under-graduate Students Rating: 0 out of 5 stars0 ratings5G/5G-Advanced: The New Generation Wireless Access Technology Rating: 0 out of 5 stars0 ratingsPeering Carrier Ethernet Networks Rating: 0 out of 5 stars0 ratingsTowards 5G: Applications, Requirements and Candidate Technologies Rating: 0 out of 5 stars0 ratingsHandbook of Green Information and Communication Systems Rating: 0 out of 5 stars0 ratingsBio-Inspired Computation in Telecommunications Rating: 0 out of 5 stars0 ratingsEnergy Management in Wireless Sensor Networks Rating: 4 out of 5 stars4/5Introduction to Data Compression Rating: 0 out of 5 stars0 ratingsHandbook of Smart Antennas for RFID Systems Rating: 0 out of 5 stars0 ratingsBuilding Wireless Sensor Networks: Application to Routing and Data Diffusion Rating: 0 out of 5 stars0 ratingsCooperative and Graph Signal Processing: Principles and Applications Rating: 0 out of 5 stars0 ratingsAdvanced Internet Protocols, Services, and Applications Rating: 0 out of 5 stars0 ratingsFlexible Distribution Networks Rating: 0 out of 5 stars0 ratingsDesign Recipes for FPGAs: Using Verilog and VHDL Rating: 2 out of 5 stars2/5Management, Control and Evolution of IP Networks Rating: 0 out of 5 stars0 ratingsNetwork Coding: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsSoftware Defined Networks: A Comprehensive Approach Rating: 0 out of 5 stars0 ratingsLPWAN Technologies for IoT and M2M Applications Rating: 0 out of 5 stars0 ratingsWireless Sensor Networks: Technology, Protocols, and Applications Rating: 0 out of 5 stars0 ratingsPervasive Computing and Networking Rating: 0 out of 5 stars0 ratingsFiber to the Home: The New Empowerment Rating: 3 out of 5 stars3/5Multimedia Multicast on the Internet Rating: 0 out of 5 stars0 ratingsNetwork Infrastructure and Architecture: Designing High-Availability Networks Rating: 0 out of 5 stars0 ratingsOptical Fiber Telecommunications Volume VIB: Systems and Networks Rating: 0 out of 5 stars0 ratingsRecent Trends in Computational Intelligence Enabled Research: Theoretical Foundations and Applications Rating: 0 out of 5 stars0 ratingsPerformance Evaluation by Simulation and Analysis with Applications to Computer Networks Rating: 0 out of 5 stars0 ratingsCognitive Communications: Distributed Artificial Intelligence (DAI), Regulatory Policy and Economics, Implementation Rating: 0 out of 5 stars0 ratingsWireless Broadband Networks Rating: 0 out of 5 stars0 ratingsWireless Networking Complete Rating: 5 out of 5 stars5/5
System Administration For You
Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Linux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsMastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5Practical Data Analysis Rating: 4 out of 5 stars4/5Git Essentials Rating: 4 out of 5 stars4/5PowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Wordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsLearn PowerShell Scripting in a Month of Lunches Rating: 0 out of 5 stars0 ratingsBash for Fun: Bash Programming: Principles and Examples Rating: 0 out of 5 stars0 ratingsLinux Command-Line Tips & Tricks Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 0 out of 5 stars0 ratingsArduino: A Quick-Start Beginner's Guide Rating: 4 out of 5 stars4/5The Complete Powershell Training for Beginners Rating: 0 out of 5 stars0 ratingsImprove your skills with Google Sheets: Professional training Rating: 0 out of 5 stars0 ratingsNmap: Network Exploration and Security Auditing Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsWorking with Linux – Quick Hacks for the Command Line Rating: 5 out of 5 stars5/5Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Rating: 0 out of 5 stars0 ratingsPractical Windows Forensics Rating: 0 out of 5 stars0 ratingsPowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Networking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Windows Command Prompt Rating: 0 out of 5 stars0 ratings
Reviews for A Study of Black Hole Attack Solutions
0 ratings0 reviews