NS2-based Black Hole Attack Modeling and Simulation of Ad Hoc Network

被引:1
|
作者
Ding, Yuanming [1 ,2 ]
Qu, Hao [2 ,3 ]
Wang, Xue [3 ]
机构
[1] Dalian Univ, Univ Key Lab Commun & Signal Proc, 10 Xuefu St, Dalian 116622, Peoples R China
[2] Dalian Univ, Key Lab Commun Networks & Informat Proc, Dalian 116622, Peoples R China
[3] Dalian Univ, Coll Informat Engn, Dalian 116622, Peoples R China
关键词
Black hole attack; Network simulation; Mobile Ad Hoc network (MANET);
D O I
10.4028/www.scientific.net/AMR.846-847.1697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Taking the AODV protocol as an example, the attack characteristics of different types of black holes are analyzed. Then, an attack model of black hole is established. Finally, the effects of black hole attacks to network performance are analyzed by simulations in different types and intensities. The simulation results show that this model can accurately simulate the impact of black hole attack on network performance and can provide reference and corresponding simulation environment for the security research of Ad Hoc network.
引用
收藏
页码:1697 / +
页数:2
相关论文
共 50 条
  • [1] BLACK HOLE ATTACK MODEL AND SIMULATION FOR MOBILE AD HOC NETWORK
    Ding, Yuanming
    Qu, Hao
    Li, Guang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2015, 11 (01): : 203 - 211
  • [2] Performance Evaluation of Ad hoc Network Under Black hole Attack
    Sahu, Rakesh Kumar
    Chaudhari, Narendra S.
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 780 - 784
  • [3] A Survey over Black hole Attack Detection in Mobile Ad hoc Network
    Behzad, Shahram
    Jamali, Shahram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 44 - 51
  • [4] A Rank Sequence Method for Detecting Black Hole Attack in Ad hoc Network
    Xiong Kai
    Yin Mingyong
    Li Wenkang
    Jiang Hong
    PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTERNET OF THINGS, 2015, : 155 - 159
  • [5] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [6] Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network
    Arunmozhi, S. A.
    Venkataramani, Y.
    INFORMATION SECURITY JOURNAL, 2012, 21 (03): : 150 - 158
  • [7] Research on NS2-based P2P network simulation platform
    Wu, Kun
    Dai, Han
    Ye, Bao-Liu
    Lu, Sang-Lu
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2006, 18 (08): : 2152 - 2157
  • [8] The comparision and simulation of Ad hoc network routing protocol based on NS2
    Fan Y.-Q.
    Wang L.-Z.
    Zhou L.
    Journal of Networks, 2010, 5 (04) : 435 - 442
  • [9] The NS2-based Simulation and Research on Wireless Sensor Network Route Protocol
    Zhang, Junguo
    Li, Wenbin
    Cui, Dongxu
    Zhao, Xueliang
    Yin, Zhongxing
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3146 - 3149
  • [10] Comparative Analysis of Black Hole Attack in Ad Hoc Network Using AODV and OLSR Protocols
    Praveen, K. S.
    Gururaj, H. L.
    Ramesh, B.
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 325 - 330