logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) A Study of Black Hole Attack Solutions. On AODV Routing Protocol in MANET by Elahe Fazeldehkordi, I.S. Amiri, Oluwatobi Ayodeji Akanbi ISBN 9780128053676, 0128053674

  • SKU: EBN-5433144
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.4

7 reviews
Instant download (eBook) A Study of Black Hole Attack Solutions. On AODV Routing Protocol in MANET after payment.
Authors:Elahe Fazeldehkordi, I.S. Amiri, Oluwatobi Ayodeji Akanbi
Pages:122 pages.
Year:2015
Editon:1
Publisher:Syngress Publishing
Language:english
File Size:10.36 MB
Format:pdf
ISBNS:9780128053676, 0128053674
Categories: Ebooks

Product desciption

(Ebook) A Study of Black Hole Attack Solutions. On AODV Routing Protocol in MANET by Elahe Fazeldehkordi, I.S. Amiri, Oluwatobi Ayodeji Akanbi ISBN 9780128053676, 0128053674

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETsExplains the significance behind the need of wireless networks and MANET securityUnderstand MANET routing protocols, namely the ADOV method
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products