O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

A Study of Black Hole Attack Solutions

Book Description

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

  • Elaborates on the basics of wireless networks, MANETs
  • Explains the significance behind the need of wireless networks and MANET security
  • Understand MANET routing protocols, namely the ADOV method

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of Tables
  6. List of Figures
  7. Preface
  8. Chapter 1. Introduction
    1. Abstract
    2. 1.1 Introduction
    3. 1.2 Problem Background
    4. 1.3 Problem Statement
    5. 1.4 Intent of Study
    6. 1.5 Aims
    7. 1.6 Scope
    8. 1.7 The Significance of the Book
    9. 1.8 Organization of the Book
  9. Chapter 2. Literature Review
    1. Abstract
    2. 2.1 Introduction
    3. 2.2 Network
    4. 2.3 Wired Networks
    5. 2.4 Why Wireless Networks?
    6. 2.5 Wireless Networks
    7. 2.6 Ad Hoc Networks
    8. 2.7 Routing
    9. 2.8 Ad Hoc Network Routing Protocols
    10. 2.9 MANETs Routing Protocols
    11. 2.10 Optimized Link State Routing Protocol (OLSR)
    12. 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV)
    13. 2.12 Dynamic Source Routing Protocol (DSR)
    14. 2.13 Security Challenges in MANETs
    15. 2.14 Related Studies
    16. 2.15 Investigated Solutions
    17. 2.16 Intrusion Detection System (IDSAODV)
    18. 2.17 Evaluation Metrics
    19. 2.18 Summary
  10. Chapter 3. Research Methodology
    1. Abstract
    2. 3.1 Introduction
    3. 3.2 Research Structure
    4. 3.3 Summary
  11. Chapter 4. Investigation and Selection Procedure
    1. Abstract
    2. 4.1 Introduction
    3. 4.2 Executing a New Routing Protocol in NS to Simulate Black Hole Behavior
    4. 4.3 Examining the Black Hole AODV
    5. 4.4 Simulation of Black Hole Attack
    6. 4.5 Summary
  12. Chapter 5. Solution Execution and Result
    1. Abstract
    2. 5.1 Introduction
    3. 5.2 An Outline of Investigation
    4. 5.3 Execution of the Solution in NS-2
    5. 5.4 Testing the IDSAODV
    6. 5.5 Simulation of IDSAODV and Appraisal of Results
    7. 5.6 Summary
  13. Chapter 6. Conclusion and Future Work
    1. Abstract
    2. 6.1 Overview
    3. 6.2 Contribution
    4. 6.3 Future Work
  14. References
  15. Appendix A. Blackholeaodv TCL File
  16. Appendix B. Trace File Example
  17. Appendix C. Trace File Field Types