Black Hole Attack Implementation in Ns2How to implement black hole attack using ns2 code
What is black hole attack:
A black hole has two properties.
- First is the node exploits the ad hoc routing protocol, such as AODV protocol , to advertise itself as having a valid route to a destination node. Node which exploits AODV Protocol route is spurious, which has intention to make intercepting packets.
- Second, The Node Which exploits AODV Protocol route consumes the intercepted packets.
Classification black hole attack:
Black hole Attack can be classified into following types,
- Passive black hole attack in ns2 .
- Active black hole attack in ns2.
- Common black hole attack in ns2.
Models of black hole attacks in ns2 :
- Active black hole node receives the RREQ packet and returns false RREP packet.
- Active black hole node receives RRER or RREP packets and process them normally.
- Active black hole node receives a data packet and discards it.
- Passive black hole node receives a data packet and discards it.
- Passive black hole node receives an AODV routing packet and normally process it.
- Ordinary black hole node discards all packets.
Sample code for black hole attack:
#Code that defines black hole attackers in ns2 simulation:
Journal Support for Research Scholars
Ns2 Projects Work Progress
- MANET – Mobile Ad Hoc Network 95%
- VANET – Vechicle Ad Hoc Netwok 97%
- LTE – Long Term Evolution 78%
- IoT – Internet of Things 90%
- Wireless Sensor Network 89%
- Network Security 89%
- Ns2 Attacks 96%
- Cognitive Radio Network 85%
- Parallel and Distributed Computing 73%
- SDN – Software Defined Networking 95%
- P2P , Video Streaming , Peersim 96%
- IPV4 , IPV6 88%
- 4G Network , 5G Network 80%
- Visual , Underwater Sensor Network 79%
- Multicasting Communication 84%
- Wimax, WiFi 90%
- OFDMA 94%