NS2-based Black Hole Attack Modeling and Simulation of Ad Hoc Network

被引:1
|
作者
Ding, Yuanming [1 ,2 ]
Qu, Hao [2 ,3 ]
Wang, Xue [3 ]
机构
[1] Dalian Univ, Univ Key Lab Commun & Signal Proc, 10 Xuefu St, Dalian 116622, Peoples R China
[2] Dalian Univ, Key Lab Commun Networks & Informat Proc, Dalian 116622, Peoples R China
[3] Dalian Univ, Coll Informat Engn, Dalian 116622, Peoples R China
关键词
Black hole attack; Network simulation; Mobile Ad Hoc network (MANET);
D O I
10.4028/www.scientific.net/AMR.846-847.1697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Taking the AODV protocol as an example, the attack characteristics of different types of black holes are analyzed. Then, an attack model of black hole is established. Finally, the effects of black hole attacks to network performance are analyzed by simulations in different types and intensities. The simulation results show that this model can accurately simulate the impact of black hole attack on network performance and can provide reference and corresponding simulation environment for the security research of Ad Hoc network.
引用
收藏
页码:1697 / +
页数:2
相关论文
共 50 条
  • [41] Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators
    El Houssaini, Souad
    El Houssaini, Mohammed-Alamine
    El Kafi, Jamal
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (05) : 734 - 755
  • [42] Black Hole and Mobile Ad Hoc Network (MANET): A Simple Logical Solution
    Aljumah, Abdullah
    Ahamad, Tariq
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 9 - 12
  • [43] An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
    Cai, Jiwen
    Yi, Ping
    Chen, Jialin
    Wang, Zhiyang
    Liu, Ning
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 775 - 780
  • [44] Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
    Noguchi, Taku
    Hayakawa, Mayuko
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 539 - 544
  • [45] Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks
    Heydari V.
    Yoo S.-M.
    International Journal of Wireless Information Networks, 2018, 25 (1) : 15 - 29
  • [46] Variable control chart for detecting black hole attack in vehicular ad-hoc networks
    Badreddine Cherkaoui
    Abderrahim Beni-hssane
    Mohammed Erritali
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5129 - 5138
  • [47] Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks: Military Perspective
    Singh, Bikramjeet
    Srikanth, Dasari
    Kumar, C. R. Suthikshn
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 810 - 814
  • [48] Variable control chart for detecting black hole attack in vehicular ad-hoc networks
    Cherkaoui, Badreddine
    Beni-hssane, Abderrahim
    Erritali, Mohammed
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5129 - 5138
  • [49] Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET)
    Purohit, Kamlesh Chandra
    Dimri, Sushil Chandra
    Jasola, Sanjay
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 5099 - 5114
  • [50] Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks
    Banerjee, Sukla
    WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 337 - 342