A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. - Elaborates on the basics of wireless networks, MANETs - Explains the significance behind the need of wireless networks and MANET security - Understand MANET routing protocols, namely the ADOV method
1143864035
A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. - Elaborates on the basics of wireless networks, MANETs - Explains the significance behind the need of wireless networks and MANET security - Understand MANET routing protocols, namely the ADOV method
69.95 In Stock
A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET

A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET

A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET

A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET

eBook

$69.95 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. - Elaborates on the basics of wireless networks, MANETs - Explains the significance behind the need of wireless networks and MANET security - Understand MANET routing protocols, namely the ADOV method

Product Details

ISBN-13: 9780128053799
Publisher: Syngress Publishing
Publication date: 11/03/2015
Sold by: Barnes & Noble
Format: eBook
Pages: 122
File size: 4 MB

About the Author

Dr. Iraj Sadegh Amiri received his B. Sc (Applied Physics) from Public University of Urmia, Iran in 2001 and a gold medalist M. Sc. in optics from University Technology Malaysia (UTM), in 2009. He was awarded a PhD degree in photonics in Jan 2014. He has published well over 350 academic publications since the 2012s in optical soliton communications, laser physics, photonics, optics and nanotechnology engineering. Currently he is a senior lecturer in University of Malaysia (UM), Kuala Lumpur, Malaysia.E. Fazeldehkordi received her Associate's Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.O.A. Akanbi received his B. Sc. (Hons, Information Technology – Software Engineering) from Kuala Lumpur Metropolitan University, Malaysia, M. Sc. in Information Security from University Teknologi Malaysia (UTM), and he is presently a graduate student in Computer Science at Texas Tech University His area of research is in CyberSecurity.
E. Fazeldehkordi received her Associate’s Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.

Table of Contents

- Introduction - Literature Review - Research Methodology - Investigation and Procedure Option - Solution Execution and Results - Conclusion and Future Work
From the B&N Reads Blog

Customer Reviews