Send or share

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
R1,277
List Price R1,314

Pay from as little as R319.25Learn more

payflex-widget-image
Discovery Miles12770
Mobicred@R120pm x 12* Mobicred Info

Non-Returnable

Free Delivery

Free Delivery

Delivery Advice

Ships in 10 - 15 working days

Toggle WishListAdd to wish list
Review this Item

Product Description

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details


Trending On Loot

COPYRIGHT © 2025 AFRICA ONLINE RETAIL (PTY)LTD. ALL RIGHTS RESERVED. Khutaza Park, 27 Bell Crescent, Westlake Business Park. PO Box 30836, Tokai, 7966, South Africa. info@loot.co.za

All prices displayed are subject to fluctuations and stock availability as outlined in our Terms & Conditions