Results 1 to 10 of 10

Thread: wormhole attack and simulating blackhole attack in ns-2

  1. #1
    Join Date
    Oct 2010
    Posts
    103

    wormhole attack and simulating blackhole attack in ns-2

    Hey friend I want to create something and related to this I need your help guys. And I think in future I can share more information related to this. Actually in NS-2 I want to implement the blackhole attack and wormhole attack by using the aodv protocol. Related to this I have implemented the blackhole but in this there is an issue because of which I am not able to get succeed in this. Actually in this I want to drop the selective but it drops all the packets in this so is there anybody able to help me over here? And also I want to know that how a wormhole attack is implemented in ns-2 at the network layer??

  2. #2
    Join Date
    May 2009
    Posts
    1,084

    Re: wormhole attack and simulating blackhole attack in ns-2

    Hey I have good news for you. I have seen your thread and at the time when I search related to this then I have found that this query gets resolved. Actually wormhole attack is implemented in ns2 at the network layer and to check more on this you can click over here. After going to this link I think you will get some nice information related to your query. So just go through this.

  3. #3
    Join Date
    Jul 2009
    Posts
    1,118

    Re: wormhole attack and simulating blackhole attack in ns-2

    When I have seen this thread so at that time I think may be in this I will get my solution but in this, whatever the solution is given here is of no use for me. In this the reason is that I desire to implement a wormhole attack in ns-2 by utilizing the aodv or dsdv protocol. So that is why in this I need a tcl code to start. I have searched regarding this but not able to get the perfect solution for this so if anybody have solution for this then help me.

  4. #4
    Join Date
    Jul 2009
    Posts
    1,179

    Re: wormhole attack and simulating blackhole attack in ns-2

    After visiting the link which is given above in the thread my problem get solved. Actually I am also facing this problem but after getting the link I have visited this and now I get the things related to this issue. So that is why I suggest you to visit this and follow the second post and you may also get solution fo your issue. Actually their lots of example is given their which will help you in getting the things.

  5. #5
    Join Date
    Mar 2011
    Posts
    1

    Re: wormhole attack and simulating blackhole attack in ns-2

    Please does anyone have tcl code for wormhole attack?

  6. #6
    Join Date
    Mar 2011
    Posts
    1

    Re: wormhole attack and simulating blackhole attack in ns-2

    pls anyone have code for blackhole attack

  7. #7
    Join Date
    Jun 2011
    Posts
    1

    sad Re: wormhole attack and simulating blackhole attack in ns-2

    hey any one here knows the code of simulation of detection of balck hole attack in AODV routing protocol and also the Simulation code of removal of black hole attack in AODV both the work is in NS2

  8. #8
    Join Date
    Nov 2011
    Posts
    1

    Re: wormhole attack and simulating blackhole attack in ns-2

    can u please send me this simulation on warmhole/blackhole/syn flooding attack (any) in ns2.
    i really need a simulation on security threats and i am not able to make any..
    i would be really tahankful to u..if u would send the simulation to me..
    kindly send me the simulation at

  9. #9
    Join Date
    Feb 2012
    Posts
    1

    Re: wormhole attack and simulating blackhole attack in ns-2

    plz send me the code for detection of blackhole and wormhole attack in manet... i need it urgent....
    Last edited by vipan2u; 01-02-2012 at 09:34 PM.

  10. #10
    Join Date
    Dec 2007
    Posts
    1,736

    Re: wormhole attack and simulating blackhole attack in ns-2

    Quote Originally Posted by vipan2u View Post
    plz send me the code for detection of blackhole and wormhole attack in manet... i need it urgent....
    The harshness of the wormhole attack comes from the fact that it is difficult to detect, and is effective even in a network where confidentiality, integrity, authentication, and non-repudiation (via encryption, digesting, and digital signature) are preserved. Furthermore, on a distance vector routing protocol, wormholes are very likely to be chosen as routes because they provide a shorter path.

Similar Threads

  1. Don't know what is Smurf Attack
    By Owen Fernandes in forum Networking & Security
    Replies: 5
    Last Post: 19-01-2010, 12:16 PM
  2. TCP SYN Attack
    By abbase in forum Networking & Security
    Replies: 3
    Last Post: 07-10-2009, 01:49 PM
  3. Dictionary Attack
    By Emma.J in forum Off Topic Chat
    Replies: 3
    Last Post: 22-08-2009, 04:49 PM
  4. What is DDoS attack?
    By Gopesh in forum Networking & Security
    Replies: 4
    Last Post: 06-05-2009, 05:54 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,462,653.51879 seconds with 17 queries