LEADER 06231nam 2200589 450 001 996426331803316 005 20230120002241.0 010 $a0-12-805367-4 010 $a0-12-805379-8 035 $a(CKB)3710000000499532 035 $a(EBL)4085630 035 $a(MiAaPQ)EBC4085630 035 $a(CaSebORM)9780128053799 035 $a(EXLCZ)993710000000499532 100 $a20151207h20162016 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 12$aA study of black hole attack solutions $eon AODV routing protocol in MANET /$fElahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi, University of Malaya, Kuala Lumpur, Malaysia ; Matthew Neely, technical editor 205 $a1st edition 210 1$aWaltham, MA :$cElsevier,$d[2016] 210 4$dİ2016 215 $a1 online resource (124 p.) 225 0 $aSyngress advanced topics in information security 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references. 327 $aFront Cover; A Study of Black Hole Attack Solutions; Copyright Page; Contents; List of Tables; List of Figures; Preface; 1 Introduction; 1.1 Introduction; 1.2 Problem Background; 1.3 Problem Statement; 1.4 Intent of Study; 1.5 Aims; 1.6 Scope; 1.7 The Significance of the Book; 1.8 Organization of the Book; 2 Literature Review; 2.1 Introduction; 2.2 Network; 2.3 Wired Networks; 2.4 Why Wireless Networks?; 2.5 Wireless Networks; 2.5.1 IEEE Standard for Wireless Networks; 2.5.2 Categorization of Wireless Networks; 2.5.2.1 Infrastructure Networks; 2.5.2.2 Infrastructure-Less Networks 327 $a2.5.3 Benefits of Wireless Networks2.5.4 Weaknesses of Wireless Networks; 2.6 Ad Hoc Networks; 2.6.1 Static Ad Hoc Networks; 2.6.2 Mobile Ad Hoc Networks (MANETs); 2.6.2.1 Categorization of MANETs; 2.6.2.1.1 Vehicular Ad hoc Networks (VANETs); 2.6.2.1.2 Intelligent Vehicular Ad hoc Networks (InVANETs); 2.6.2.1.3 Internet-Based MANETs (IMANETs); 2.6.2.2 Features of MANET; 2.6.2.3 Utilization of MANET; 2.6.2.4 Benefits of MANET; 2.6.2.5 Weaknesses of MANET; 2.7 Routing; 2.8 Ad Hoc Network Routing Protocols; 2.9 MANETs Routing Protocols; 2.9.1 Categorization of Routing Protocols 327 $a2.9.1.1 Table-Driven (Proactive) Routing2.9.1.2 Reactive (On-Demand) Routing; 2.9.1.3 Hybrid Routing; 2.10 Optimized Link State Routing Protocol (OLSR); 2.10.1 OLSR Working; 2.10.1.1 Multipoint Relaying (MPR); 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV); 2.11.1 Routing in AODV; 2.11.1.1 Route Discovery Mechanism in AODV; 2.11.1.2 Route Maintenance Mechanism in AODV; 2.11.2 Features of AODV; 2.11.3 Benefits and Weaknesses of AODV; 2.12 Dynamic Source Routing Protocol (DSR); 2.12.1 Route Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs 327 $a2.13.1 Categorizations of MANET Attacks2.13.2 Black Hole Attack in MANETs; 2.13.3 Black Hole Attack in AODV; 2.13.4 Black Hole Attack in OLSR; 2.13.5 Other Attacks in MANETs; 2.13.5.1 Gray Hole Attack; 2.13.5.2 Flooding Attack; 2.13.5.3 Selfish Node; 2.13.5.4 Wormhole Attack; 2.13.5.5 Sleep Deprivation Torture Attack; 2.13.5.6 Jellyfish Attack; 2.13.5.7 Modification Attack; 2.13.5.8 Misrouting Attack; 2.13.5.9 Impersonation Attack; 2.13.5.10 Routing Table Overflow Attack; 2.14 Related Studies; 2.15 Investigated Solutions; 2.16 Intrusion Detection System (IDSAODV); 2.17 Evaluation Metrics 327 $a2.18 Summary3 Research Methodology; 3.1 Introduction; 3.2 Research Structure; 3.2.1 Phase 1: Investigating the Existing Solutions; 3.2.2 Phase 2; 3.2.2.1 Phase 2a: Clarifying Efficient Solution; 3.2.2.2 Phase 2b: Executing the Existed Solution; 3.2.2.2.1 Simulation: The Customary Definition; 3.2.2.2.2 Network Simulator (NS); 3.2.2.2.3 Tool Command Language (Tcl) in NS; 3.2.3 Phase 3: Comparing the Effects of Recommended Solution on MANET Performance; 3.3 Summary; 4 Investigation and Selection Procedure; 4.1 Introduction 327 $a4.2 Executing a New Routing Protocol in NS to Simulate Black Hole Behavior 330 $aMobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method 606 $aAd hoc networks (Computer networks) 606 $aRouting protocols (Computer network protocols) 606 $aComputer networks$xSecurity measures 615 0$aAd hoc networks (Computer networks) 615 0$aRouting protocols (Computer network protocols) 615 0$aComputer networks$xSecurity measures. 700 $aFazeldehkordi$b Elahe$0883372 702 $aAmiri$b Iraj Sadegh 702 $aAkanbi$b Oluwatobi Ayodeji 702 $aNeely$b Matthew 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996426331803316 996 $aA study of black hole attack solutions$91973135 997 $aUNISA LEADER 01538nas 2200433 a 450 001 996199637503316 005 20240413013510.0 011 0 $a1941-8280$l1941-8272$21 035 $a(OCoLC)76737463 035 $a(CKB)1000000000290003 035 $a(CONSER)ce2006301798 035 $a(EXLCZ)991000000000290003 100 $a20021209a20009999 sy a 101 0 $aeng 135 $aurcn|||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPolicy matters /$fInstitute for Research on Public Policy = Enjeux publics / Institut de recherche en politiques publiques 210 $a[Montre?al] $cInstitute for Research on Public Policy = Institut de recherche en politiques publiques$d2000- 300 $aPublisher's website: http://irpp.org. 300 $aEach issue has also a distinctive title. 300 $aArchived by Library and Archives Canada. 300 $aTitle from title page (viewed on Aug. 14, 2006). 517 3 $aPolicy matters 517 3 $aEnjeux publics 531 $aPOLICY MATTERS 606 $aPolitical science$vPeriodicals 606 $aScience politique$vPe?riodiques 607 $aCanada$xPolitics and government$vPeriodicals 607 $aCanada$xPolitique et gouvernement$vPe?riodiques 615 0$aPolitical science 615 6$aScience politique 676 $a320/.05 712 02$aInstitute for Research on Public Policy. 906 $aJOURNAL 912 $a996199637503316 996 $aPolicy matters$92290104 997 $aUNISA