ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Security

A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET

| £58.28 | €65.55 | Ca$94.56 | Au$93.32
by Elahe Fazeldehkordi & I. S. Amiri & Oluwatobi Ayodeji Akanbi
What is this?DRM-EPUB by download  |  $69.95
What is this?DRM-PDF by download  |  $69.95
add to wish list
A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET by Elahe Fazeldehkordi & I. S. Amiri & Oluwatobi Ayodeji Akanbi

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

  • Elaborates on the basics of wireless networks, MANETs
  • Explains the significance behind the need of wireless networks and MANET security
  • Understand MANET routing protocols, namely the ADOV method

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 788981

Ebook Details
Pages: 122
Size: 4.3 MB
Publisher: Syngress
Date published:   2015
ISBN: 9780128053799 (DRM-EPUB)
2370007160174 (DRM-PDF)

DRM Settings
Read Aloud:  not allowed

This product is listed in the following category:

Nonfiction > Computers > Security

These authors have products in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Networking
Nonfiction > Computers > Networking > Security

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016