A Study of Black Hole Attack Solutions

  • Author : Elahe Fazeldehkordi
  • Publsiher : Syngress
  • Release : 03 November 2015
  • ISBN : 9780128053799
  • Page : 122 pages
  • Rating : 4/5 from 21 voters

Download or read online book entitled A Study of Black Hole Attack Solutions written by Elahe Fazeldehkordi and published by Syngress. This book was released on 03 November 2015 with total page 122 pages. Available in PDF, EPUB and Kindle. Get best books that you want by click Get Book Button and Read as many books as you like. Book Excerpt : Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method

A Study of Black Hole Attack Solutions

A Study of Black Hole Attack Solutions
Author: Elahe Fazeldehkordi,Iraj Sadegh Amiri,Oluwatobi Ayodeji Akanbi
Publisher: Syngress
Relase: 2015-11-03
ISBN: 9780128053799
GET BOOK

A Study of Black Hole Attack Solutions

A Study of Black Hole Attack Solutions
Author: I. S. Amiri,Elahe Fazeldehkordi,Oluwatobi Ayodeji Akanbi
Publisher: Syngress Publishing
Relase: 2015-11-20
ISBN: 0128053674
GET BOOK

A Study of Black Hole Attack Solutions

A Study of Black Hole Attack Solutions
Author: Anonim
Publisher: Unknown
Relase: 2021-09-26
ISBN: OCLC:972032560
GET BOOK

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
Author: K. Martin Sagayam,Bharat Bhushan,Victor Hugo C. de Albuquerque,A. Diana Andrushia
Publisher: IGI Global
Relase: 2020
ISBN: 9781799850694
GET BOOK

Advances in Computer Science and Ubiquitous Computing

Advances in Computer Science and Ubiquitous Computing
Author: James J. Park,Simon James Fong,Yi Pan,Yunsick Sung
Publisher: Springer Nature
Relase: 2021-01-04
ISBN: 9789811593437
GET BOOK

Prevention of Attacks Usign Umpiring Security Model for Manets

Prevention of Attacks Usign Umpiring Security Model for Manets
Author: Ayyaswamy Kathirvel,Srinivasan Rengaramanujam,Mohanambal Kathirvel
Publisher: LAP Lambert Academic Publishing
Relase: 2012-04
ISBN: 3848499010
GET BOOK

Intrusion Detection in Wireless Ad Hoc Networks

Intrusion Detection in Wireless Ad Hoc Networks
Author: Nabendu Chaki,Rituparna Chaki
Publisher: CRC Press
Relase: 2014-02-06
ISBN: 9781466515659
GET BOOK

Machine Learning for Computer and Cyber Security

Machine Learning for Computer and Cyber Security
Author: Brij B. Gupta,Quan Z. Sheng
Publisher: CRC Press
Relase: 2019-02-05
ISBN: 9780429995712
GET BOOK

Smart and Innovative Trends in Next Generation Computing Technologies

Smart and Innovative Trends in Next Generation Computing Technologies
Author: Pushpak Bhattacharyya,Hanumat G. Sastry,Venkatadri Marriboyina,Rashmi Sharma
Publisher: Springer
Relase: 2018-06-08
ISBN: 9789811086601
GET BOOK

Cryptography Breakthroughs in Research and Practice

Cryptography  Breakthroughs in Research and Practice
Author: Management Association, Information Resources
Publisher: IGI Global
Relase: 2019-12-06
ISBN: 9781799817642
GET BOOK

Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications
Author: Ion Bica,David Naccache,Emil Simion
Publisher: Springer
Relase: 2016-01-14
ISBN: 9783319271798
GET BOOK

Future Information Communication Technology and Applications

Future Information Communication Technology and Applications
Author: Hoe-Kyung Jung,Jung Tae Kim,Tony Sahama,Chung-Huang Yang
Publisher: Springer Science & Business Media
Relase: 2013-05-25
ISBN: 9789400765160
GET BOOK

Information Processing and Management

Information Processing and Management
Author: Vinu V Das,R. Vijayakumar,Narayan C. Debnath,Janahanlal Stephen,Natarajan Meghanathan,Suresh Sankaranarayanan,P.M. Thankachan,Ford Lumban Gaol,Nessy Thankachan
Publisher: Springer Science & Business Media
Relase: 2010-04-01
ISBN: 9783642122132
GET BOOK

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Author: Gupta, Brij,Agrawal, Dharma P.,Yamaguchi, Shingo
Publisher: IGI Global
Relase: 2016-05-16
ISBN: 9781522501060
GET BOOK

Information Networking Towards Ubiquitous Networking and Services

Information Networking  Towards Ubiquitous Networking and Services
Author: Teresa Vazão,Mário M. Freire,Ilyoung Chong
Publisher: Springer
Relase: 2008-11-20
ISBN: 9783540895244
GET BOOK