List of Figures

Figure 2.1 Communications in wireless networks 11
Figure 2.2 Infrastructure-based network 12
Figure 2.3 Infrastructure-less network 12
Figure 2.4 Simple ad hoc network 13
Figure 2.5 MANET 15
Figure 2.6 MANET 16
Figure 2.7 MANET routing protocols 24
Figure 2.8 Another classification of MANET routing protocols 28
Figure 2.9 Flooding packets using MPR 30
Figure 2.10 Hello message exchange 30
Figure 2.11 AODV mechanisms 32
Figure 2.12 Flooding RREQ in AODV 32
Figure 2.13 Route reply in AODV 33
Figure 2.14 AODV route discovery 34
Figure 2.15 Route error message in AODV 35
Figure 2.16 Classification of MANET attacks 39
Figure 2.17 Active and passive attack in MANETs 42
Figure 2.18 External and internal attacks in ...

Get A Study of Black Hole Attack Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.