Book description
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
- Elaborates on the basics of wireless networks, MANETs
- Explains the significance behind the need of wireless networks and MANET security
- Understand MANET routing protocols, namely the ADOV method
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- List of Tables
- List of Figures
- Preface
- Chapter 1. Introduction
-
Chapter 2. Literature Review
- Abstract
- 2.1 Introduction
- 2.2 Network
- 2.3 Wired Networks
- 2.4 Why Wireless Networks?
- 2.5 Wireless Networks
- 2.6 Ad Hoc Networks
- 2.7 Routing
- 2.8 Ad Hoc Network Routing Protocols
- 2.9 MANETs Routing Protocols
- 2.10 Optimized Link State Routing Protocol (OLSR)
- 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV)
- 2.12 Dynamic Source Routing Protocol (DSR)
- 2.13 Security Challenges in MANETs
- 2.14 Related Studies
- 2.15 Investigated Solutions
- 2.16 Intrusion Detection System (IDSAODV)
- 2.17 Evaluation Metrics
- 2.18 Summary
- Chapter 3. Research Methodology
- Chapter 4. Investigation and Selection Procedure
- Chapter 5. Solution Execution and Result
- Chapter 6. Conclusion and Future Work
- References
- Appendix A. Blackholeaodv TCL File
- Appendix B. Trace File Example
- Appendix C. Trace File Field Types
Product information
- Title: A Study of Black Hole Attack Solutions
- Author(s):
- Release date: November 2015
- Publisher(s): Syngress
- ISBN: 9780128053799
You might also like
book
Instant Traffic Analysis with Tshark How-to
Master the terminal-based version of Wireshark for dealing with network security incidents Learn something new in …
book
Ad Hoc Networks: Routing, Qos and Optimization
This work presents ad hoc networks and their characteristics. It explains a new protocol of routing …
audiobook
Transformed
Help transform your business and innovate like the world's top tech companies! Transformed: Moving to the …
book
Crypto Dictionary
Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. …