+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Securing Mobile Ad Hoc Networks

  • ID: 2857169
  • Book
  • October 2014
  • Region: Global
  • 272 Pages
  • Elsevier Science and Technology
1 of 3

Mobile ad hoc networks (MANETs) are formed by a group of mbile nodes connected by using wireless networks without the need of a fixed infrastructure. The devices on the MANET can communicate with each other by direct peer-to-peer wireless communication when they are close to each other; otherwise they us multi-hop paths. Due to their node mobility support, decentralized architecture and dynamic routing capabilities, MANETs can be used as a stand-alone network for a group of mobile users.

Althought several routing protocols have been introduced in MANETs for efficient routing and scalable performance, Optimized Link State Routing (OLSR) has received particular attention recently. In order to reduce the flood of traffic messages in MANETs, OLSR uses Multipoint Relays (MPRs) as an internal mechanism. However, there are still a number of vulnerabilities and security issues with OLRS. Securing Mobile Ad Hoc Networks presents the latest research and methodologies for securing MPRs and OLSR, providing readers with an in-depth look at the key concepts and implementations behind secure MANETs.

Securing Mobile Ad Hoc Networks provides researchers as well as practitioners with the first and most complete framework for the concepts and research being conducted around MANET security, including in-depth coverage of MANET architecture and routing protocols, performance issues, and MANET protocol security. The book also provides case studies and simulations of attack vectors such as Black Hole Attacks using the ns2 and ns3 simulators.

  • Presents the most current and leading edge research on Mobile Ad Hoc Networks (MANETs), including in-depth coverage of MANET architecture and routing protocols.
  • Focuses on research concerning Optimized Link State Routing (OLSR) and Multipoint Relays (MPRs), including current research on vulnerabilities and security issues with OLSR.
  • Provides simulations of key attack vectors such as Black Hole Attacks using the ns2 and ns3 network simulators.
  • Includes scenario-based experiments for MANET performance evaluation and a case study covering Tree Routing Protocol.
Note: Product cover images may vary from those shown
2 of 3

Chapter 1: Introduction

Chapter 2: Routing in MANETs

Chapter 3: Issues and Challenges in Designing Secure Protocols

Chapter 4: Simulation Study of Performances in MANETs

Chapter 5: Scenario-Based Performance Evaluation of Secure Routing in MANETs

Chapter 6: Conclusion and Future Work

Appendix A: Glossary of Terms

Appendix B: Tutorial for Performance Analysis of MANET

Appendix C: Source Code Listings

Case Study: Tree Routing Protocol

References

Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Javaid, Adeel
Muhammad Adeel Javaid is an information security researcher and is recognized as a Microsoft Innovative Educator-Expert. He has recently been nominated for the Microsoft MVP Award. Muhammad serves as a Member of the Vendor Advisory Council of CompTIA and as an External Expert for European Co-operation in Science and Technology (ECOST). He has contributed numerous research articles in peer-reviewed journals.
Note: Product cover images may vary from those shown
Adroll
adroll