Book description
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
- Elaborates on the basics of wireless networks, MANETs
- Explains the significance behind the need of wireless networks and MANET security
- Understand MANET routing protocols, namely the ADOV method
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- List of Tables
- List of Figures
- Preface
- Chapter 1. Introduction
-
Chapter 2. Literature Review
- Abstract
- 2.1 Introduction
- 2.2 Network
- 2.3 Wired Networks
- 2.4 Why Wireless Networks?
- 2.5 Wireless Networks
- 2.6 Ad Hoc Networks
- 2.7 Routing
- 2.8 Ad Hoc Network Routing Protocols
- 2.9 MANETs Routing Protocols
- 2.10 Optimized Link State Routing Protocol (OLSR)
- 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV)
- 2.12 Dynamic Source Routing Protocol (DSR)
- 2.13 Security Challenges in MANETs
- 2.14 Related Studies
- 2.15 Investigated Solutions
- 2.16 Intrusion Detection System (IDSAODV)
- 2.17 Evaluation Metrics
- 2.18 Summary
- Chapter 3. Research Methodology
- Chapter 4. Investigation and Selection Procedure
- Chapter 5. Solution Execution and Result
- Chapter 6. Conclusion and Future Work
- References
- Appendix A. Blackholeaodv TCL File
- Appendix B. Trace File Example
- Appendix C. Trace File Field Types
Product information
- Title: A Study of Black Hole Attack Solutions
- Author(s):
- Release date: November 2015
- Publisher(s): Syngress
- ISBN: 9780128053799
You might also like
book
Cybersecurity in the COVID-19 Pandemic
This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
book
Ad Hoc Networks: Routing, Qos and Optimization
This work presents ad hoc networks and their characteristics. It explains a new protocol of routing …
article
Run Llama-2 Models Locally with llama.cpp
Llama is Meta’s answer to the growing demand for LLMs. Unlike its well-known technological relative, ChatGPT, …