• Home
  • A Study of Black Hole Attack Solutions

A Study of Black Hole Attack Solutions

A Study of Black Hole Attack Solutions
  • Author : Elahe Fazeldehkordi
  • Publsiher : Syngress
  • Release : 03 November 2015
  • ISBN : 0128053798
  • Pages : 122 pages
  • Rating : 4/5 from 21 ratings
GET THIS BOOKA Study of Black Hole Attack Solutions

Summary:
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method


A Study of Black Hole Attack Solutions

A Study of Black Hole Attack Solutions
  • Author : Elahe Fazeldehkordi,Iraj Sadegh Amiri,Oluwatobi Ayodeji Akanbi
  • Publisher : Syngress
  • Release : 03 November 2015
GET THIS BOOKA Study of Black Hole Attack Solutions

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept.


Recent Advances in Cryptography and Network Security

Recent Advances in Cryptography and Network Security
  • Author : Pinaki Mitra
  • Publisher : BoD – Books on Demand
  • Release : 31 October 2018
GET THIS BOOKRecent Advances in Cryptography and Network Security

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security


Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
  • Author : K. Martin Sagayam,Bharat Bhushan,Victor Hugo C. de Albuquerque,A. Diana Andrushia
  • Publisher : IGI Global
  • Release : 08 March 2021
GET THIS BOOKDeep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security



Machine Learning for Computer and Cyber Security

Machine Learning for Computer and Cyber Security
  • Author : Brij B. Gupta,Quan Z. Sheng
  • Publisher : CRC Press
  • Release : 05 February 2019
GET THIS BOOKMachine Learning for Computer and Cyber Security

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information.


Smart and Innovative Trends in Next Generation Computing Technologies

Smart and Innovative Trends in Next Generation Computing Technologies
  • Author : Pushpak Bhattacharyya,Hanumat G. Sastry,Venkatadri Marriboyina,Rashmi Sharma
  • Publisher : Springer
  • Release : 08 June 2018
GET THIS BOOKSmart and Innovative Trends in Next Generation Computing Technologies

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language


International Conference on Advanced Computing Networking and Informatics

International Conference on Advanced Computing Networking and Informatics
  • Author : Raj Kamal,Michael Henshaw,Pramod S. Nair
  • Publisher : Springer
  • Release : 27 November 2018
GET THIS BOOKInternational Conference on Advanced Computing Networking and Informatics

The book comprises selected papers presented at the International Conference on Advanced Computing, Networking and Informatics (ICANI 2018), organized by Medi-Caps University, India. It includes novel and original research work on advanced computing, networking and informatics, and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques in the field of computing and networking.


Wireless Sensor Networks

Wireless Sensor Networks
  • Author : Kazem Sohraby,Daniel Minoli,Taieb Znati
  • Publisher : John Wiley & Sons
  • Release : 06 April 2007
GET THIS BOOKWireless Sensor Networks

Infrastructure for Homeland Security Environments Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way towards a large plethora of new applications in such areas as infrastructure protection and security, healthcare, energy, food safety, RFID, ZigBee, and processing. Unlike other books on wireless sensor networks that focus


Proceedings of International Conference on Computational Intelligence and Data Engineering

Proceedings of International Conference on Computational Intelligence and Data Engineering
  • Author : Nabendu Chaki,Agostino Cortesi,Nagaraju Devarakonda
  • Publisher : Springer
  • Release : 19 December 2017
GET THIS BOOKProceedings of International Conference on Computational Intelligence and Data Engineering

The book presents high quality research work in cutting edge technologies and most-happening areas of computational intelligence and data engineering. It contains selected papers presented at International Conference on Computational Intelligence and Data Engineering (ICCIDE 2017). The conference was conceived as a forum for presenting and exchanging ideas and results of the researchers from academia and industry onto a common platform and help them develop a comprehensive understanding of the challenges of technological advancements from different viewpoints. This book will help


Introduction to Network Simulator NS2

Introduction to Network Simulator NS2
  • Author : Teerawat Issariyakul,Ekram Hossain
  • Publisher : Springer Science & Business Media
  • Release : 02 December 2011
GET THIS BOOKIntroduction to Network Simulator NS2

Introduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators,


Ad Hoc Mobile Wireless Networks

Ad Hoc Mobile Wireless Networks
  • Author : Chai K Toh
  • Publisher : Pearson Education
  • Release : 03 December 2001
GET THIS BOOKAd Hoc Mobile Wireless Networks

The authoritative guide to the state of the art in ad hoc wireless networking. Reflects the field's latest breakthroughs Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much more Includes a complete narration of prototype implementation with communication performance results from practical field trials Introduces key applications for home, business, auto, and defense "Ad hoc" wireless networks eliminate the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly"-anywhere,


Ten Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cybersecurity Operations Center
  • Author : Carson Zimmerman
  • Publisher : Anonim
  • Release : 01 July 2014
GET THIS BOOKTen Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cyber Security Operations Center conveys MITRE's accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments. This book offers perspective and context for key decision points in structuring a CSOC, such as what capabilities to offer, how to architect large-scale data collection


Phosphoric Acid Industry

Phosphoric Acid Industry
  • Author : Michael Schorr,Benjamin Valdez
  • Publisher : BoD – Books on Demand
  • Release : 12 July 2017
GET THIS BOOKPhosphoric Acid Industry

Phosphoric acid is an important industrial acid that is utilized for manufacturing phosphatic fertilizers and industrial products, for pickling and posterior treatment of steel surfaces to prevent corrosion, for ensuring appropriate paint adhesion, and for the food and beverages industry, e.g., cola-type drinks to impart taste and slight acidity and to avoid iron sedimentation. This industry is spread out in countries of four continents - Asia, Africa, America, and Europe - which operate mines and production plants and produce


ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management

ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management
  • Author : Vinit Kumar Gunjan,Vicente Garcia Diaz,Manuel Cardona,Vijender Kumar Solanki,K. V. N. Sunitha
  • Publisher : Springer
  • Release : 27 June 2019
GET THIS BOOKICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management

This book discusses reliability applications for power systems, renewable energy and smart grids and highlights trends in reliable communication, fault-tolerant systems, VLSI system design and embedded systems. Further, it includes chapters on software reliability and other computer engineering and software management-related disciplines, and also examines areas such as big data analytics and ubiquitous computing. Outlining novel, innovative concepts in applied areas of reliability in electrical, electronics and computer engineering disciplines, it is a valuable resource for researchers and practitioners of


Merchants of Doubt

Merchants of Doubt
  • Author : Naomi Oreskes,Erik M. Conway
  • Publisher : A&C Black
  • Release : 03 October 2011
GET THIS BOOKMerchants of Doubt

The U.S. scientific community has long led the world in research on such areas as public health, environmental science, and issues affecting quality of life. These scientists have produced landmark studies on the dangers of DDT, tobacco smoke, acid rain, and global warming. But at the same time, a small yet potent subset of this community leads the world in vehement denial of these dangers. Merchants of Doubt tells the story of how a loose-knit group of high-level scientists