Home Page Icon
Home Page
Table of Contents for
Cover image
Close
Cover image
by Oluwatobi Ayodeji Akanbi, Iraj Sadegh Amiri, Elahe Fazeldehkordi
A Study of Black Hole Attack Solutions
Cover image
Title page
Table of Contents
Copyright
List of Tables
List of Figures
Preface
Chapter 1. Introduction
Abstract
1.1 Introduction
1.2 Problem Background
1.3 Problem Statement
1.4 Intent of Study
1.5 Aims
1.6 Scope
1.7 The Significance of the Book
1.8 Organization of the Book
Chapter 2. Literature Review
Abstract
2.1 Introduction
2.2 Network
2.3 Wired Networks
2.4 Why Wireless Networks?
2.5 Wireless Networks
2.6 Ad Hoc Networks
2.7 Routing
2.8 Ad Hoc Network Routing Protocols
2.9 MANETs Routing Protocols
2.10 Optimized Link State Routing Protocol (OLSR)
2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV)
2.12 Dynamic Source Routing Protocol (DSR)
2.13 Security Challenges in MANETs
2.14 Related Studies
2.15 Investigated Solutions
2.16 Intrusion Detection System (IDSAODV)
2.17 Evaluation Metrics
2.18 Summary
Chapter 3. Research Methodology
Abstract
3.1 Introduction
3.2 Research Structure
3.3 Summary
Chapter 4. Investigation and Selection Procedure
Abstract
4.1 Introduction
4.2 Executing a New Routing Protocol in NS to Simulate Black Hole Behavior
4.3 Examining the Black Hole AODV
4.4 Simulation of Black Hole Attack
4.5 Summary
Chapter 5. Solution Execution and Result
Abstract
5.1 Introduction
5.2 An Outline of Investigation
5.3 Execution of the Solution in NS-2
5.4 Testing the IDSAODV
5.5 Simulation of IDSAODV and Appraisal of Results
5.6 Summary
Chapter 6. Conclusion and Future Work
Abstract
6.1 Overview
6.2 Contribution
6.3 Future Work
References
Appendix A. Blackholeaodv TCL File
Appendix B. Trace File Example
Appendix C. Trace File Field Types
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset