Library Logo

A study of black hole attack solutions : on AODV routing protocol in MANET / (Record no. 247214)

000 -LEADER
fixed length control field 07434cam a2200733Mi 4500
001 - CONTROL NUMBER
control field ocn942677380
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190328114813.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151207t20162016mauad ob 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency VT2
Language of cataloging eng
Description conventions pn
Transcribing agency VT2
Modifying agency OCLCO
-- OCLCQ
-- EBLCP
-- IDEBK
-- OPELS
-- YDXCP
-- N$T
-- DEBSZ
-- REB
-- OCLCF
-- CDX
-- IDB
-- OCLCQ
-- MERUC
-- OCLCQ
-- VT2
-- U3W
-- NLE
-- D6H
-- UAB
-- WRM
-- EZ9
-- OCLCQ
-- LOA
-- ZCU
-- ICG
-- COCUF
-- DKC
019 ## -
-- 927963546
-- 928714010
-- 936300055
-- 957641006
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128053799
Qualifying information (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0128053798
Qualifying information (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780128053676
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0128053674
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)942677380
Canceled/invalid control number (OCoLC)927963546
-- (OCoLC)928714010
-- (OCoLC)936300055
-- (OCoLC)957641006
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.55
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 013000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 014000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 018000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 067000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 032000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 037000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 052000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fazeldehkordi, Elahe.
245 12 - TITLE STATEMENT
Title A study of black hole attack solutions : on AODV routing protocol in MANET /
Medium [electronic resource]
Statement of responsibility, etc. Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi, University of Malaya, Kuala Lumpur, Malaysia ; Matthew Neely, technical editor.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Waltham, MA :
Name of publisher, distributor, etc. Elsevier,
Date of publication, distribution, etc. 2016.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (124 pages) :
Other physical details illustrations (some color).
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Syngress advanced topics in information security
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (ebrary, viewed December 7, 2015).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover; A Study of Black Hole Attack Solutions; Copyright Page; Contents; List of Tables; List of Figures; Preface; 1 Introduction; 1.1 Introduction; 1.2 Problem Background; 1.3 Problem Statement; 1.4 Intent of Study; 1.5 Aims; 1.6 Scope; 1.7 The Significance of the Book; 1.8 Organization of the Book; 2 Literature Review; 2.1 Introduction; 2.2 Network; 2.3 Wired Networks; 2.4 Why Wireless Networks?; 2.5 Wireless Networks; 2.5.1 IEEE Standard for Wireless Networks; 2.5.2 Categorization of Wireless Networks; 2.5.2.1 Infrastructure Networks; 2.5.2.2 Infrastructure-Less Networks.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.5.3 Benefits of Wireless Networks2.5.4 Weaknesses of Wireless Networks; 2.6 Ad Hoc Networks; 2.6.1 Static Ad Hoc Networks; 2.6.2 Mobile Ad Hoc Networks (MANETs); 2.6.2.1 Categorization of MANETs; 2.6.2.1.1 Vehicular Ad hoc Networks (VANETs); 2.6.2.1.2 Intelligent Vehicular Ad hoc Networks (InVANETs); 2.6.2.1.3 Internet-Based MANETs (IMANETs); 2.6.2.2 Features of MANET; 2.6.2.3 Utilization of MANET; 2.6.2.4 Benefits of MANET; 2.6.2.5 Weaknesses of MANET; 2.7 Routing; 2.8 Ad Hoc Network Routing Protocols; 2.9 MANETs Routing Protocols; 2.9.1 Categorization of Routing Protocols.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.9.1.1 Table-Driven (Proactive) Routing2.9.1.2 Reactive (On-Demand) Routing; 2.9.1.3 Hybrid Routing; 2.10 Optimized Link State Routing Protocol (OLSR); 2.10.1 OLSR Working; 2.10.1.1 Multipoint Relaying (MPR); 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV); 2.11.1 Routing in AODV; 2.11.1.1 Route Discovery Mechanism in AODV; 2.11.1.2 Route Maintenance Mechanism in AODV; 2.11.2 Features of AODV; 2.11.3 Benefits and Weaknesses of AODV; 2.12 Dynamic Source Routing Protocol (DSR); 2.12.1 Route Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.13.1 Categorizations of MANET Attacks2.13.2 Black Hole Attack in MANETs; 2.13.3 Black Hole Attack in AODV; 2.13.4 Black Hole Attack in OLSR; 2.13.5 Other Attacks in MANETs; 2.13.5.1 Gray Hole Attack; 2.13.5.2 Flooding Attack; 2.13.5.3 Selfish Node; 2.13.5.4 Wormhole Attack; 2.13.5.5 Sleep Deprivation Torture Attack; 2.13.5.6 Jellyfish Attack; 2.13.5.7 Modification Attack; 2.13.5.8 Misrouting Attack; 2.13.5.9 Impersonation Attack; 2.13.5.10 Routing Table Overflow Attack; 2.14 Related Studies; 2.15 Investigated Solutions; 2.16 Intrusion Detection System (IDSAODV); 2.17 Evaluation Metrics.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.18 Summary3 Research Methodology; 3.1 Introduction; 3.2 Research Structure; 3.2.1 Phase 1: Investigating the Existing Solutions; 3.2.2 Phase 2; 3.2.2.1 Phase 2a: Clarifying Efficient Solution; 3.2.2.2 Phase 2b: Executing the Existed Solution; 3.2.2.2.1 Simulation: The Customary Definition; 3.2.2.2.2 Network Simulator (NS); 3.2.2.2.3 Tool Command Language (Tcl) in NS; 3.2.3 Phase 3: Comparing the Effects of Recommended Solution on MANET Performance; 3.3 Summary; 4 Investigation and Selection Procedure; 4.1 Introduction.
520 8# - SUMMARY, ETC.
Summary, etc. Annotation
Expansion of summary note Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETsExplains the significance behind the need of wireless networks and MANET securityUnderstand MANET routing protocols, namely the ADOV method.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Ad hoc networks (Computer networks)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Routing protocols (Computer network protocols)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Computer Literacy.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Computer Science.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Data Processing.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Hardware
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Information Technology.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Machine Theory.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Reference.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Ad hoc networks (Computer networks)
Source of heading or term fast
Authority record control number (OCoLC)fst01743246
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Routing protocols (Computer network protocols)
Source of heading or term fast
Authority record control number (OCoLC)fst01743529
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcgft
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Amiri, Iraj Sadegh.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Akanbi, Oluwatobi Ayodeji.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Neely, Matthew.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Fazeldehkordi, Elahe.
Title A Study of Black Hole Attack Solutions : On AODV Routing Protocol in MANET.
Place, publisher, and date of publication : Elsevier Science, �2015
International Standard Book Number 9780128053676
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780128053676

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login