BLACK HOLE ATTACK MODEL AND SIMULATION FOR MOBILE AD HOC NETWORK

被引:0
|
作者
Ding, Yuanming [1 ,2 ]
Qu, Hao [1 ,2 ,3 ]
Li, Guang [1 ,2 ,3 ]
机构
[1] Dalian Univ, Univ Key Lab Commun & Signal Proc, 10 Xuefu St, Dalian 116622, Peoples R China
[2] Dalian Univ, Key Lab Commun Networks & Informat Proc, Dalian 116622, Peoples R China
[3] Dalian Univ, Coll Informat Engn, Dalian 116622, Peoples R China
关键词
Black hole attack; Network security; MANET; NS2; simulation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread applications of mobile Ad Hoc network (MANET), the network security is getting more and more attention. In order to achieve the simulation studies of black hole attacking the network, first, the black hole attack principles using protocol vulnerabilities are analyzed based on AODV protocol. Then, an attack model containing different types of black hole nodes is established based on NS2 network simulation platform. Finally, the impact of black hole attack on network performance is analyzed by simulation in different types and attack intensity. The simulation results show that the model can simulate the impact of black hole attack on network performance actually, which can provide reference and corresponding simulation environment for the research of Ad Hoc network security and tactical Internet information combat technology.
引用
收藏
页码:203 / 211
页数:9
相关论文
共 50 条
  • [1] A Survey over Black hole Attack Detection in Mobile Ad hoc Network
    Behzad, Shahram
    Jamali, Shahram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 44 - 51
  • [2] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [3] Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network
    Arunmozhi, S. A.
    Venkataramani, Y.
    INFORMATION SECURITY JOURNAL, 2012, 21 (03): : 150 - 158
  • [4] Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network
    Sharma, Romina
    Shrivastava, Rajesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (03): : 121 - 124
  • [5] Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks
    Zhao Min
    Zhou Jiliu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 26 - +
  • [6] NS2-based Black Hole Attack Modeling and Simulation of Ad Hoc Network
    Ding, Yuanming
    Qu, Hao
    Wang, Xue
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1697 - +
  • [7] Performance Evaluation of Ad hoc Network Under Black hole Attack
    Sahu, Rakesh Kumar
    Chaudhari, Narendra S.
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 780 - 784
  • [8] An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network
    Deepa
    Agarkhed, Jayashree
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 313 - 323
  • [9] Detection and Isolation of Black Hole attack in Mobile Ad Hoc Networks - A Review
    Nagasubramanian, Gayathri
    Sakthivel, Rakesh Kumar
    Patan, Rizwan
    Ehtemami, Anahid
    Meyer-Baese, Anke
    Tahmassebi, Amirhessam
    Gandomi, Amir H.
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES IV, 2020, 11419
  • [10] Solution to the black hole problem in mobile Ad-Hoc network
    Makki, S
    Pissinou, N
    Huang, H
    5th World Wireless Congress, Proceedings, 2004, : 508 - 512