BLACK HOLE ATTACK MODEL AND SIMULATION FOR MOBILE AD HOC NETWORK

被引:0
|
作者
Ding, Yuanming [1 ,2 ]
Qu, Hao [1 ,2 ,3 ]
Li, Guang [1 ,2 ,3 ]
机构
[1] Dalian Univ, Univ Key Lab Commun & Signal Proc, 10 Xuefu St, Dalian 116622, Peoples R China
[2] Dalian Univ, Key Lab Commun Networks & Informat Proc, Dalian 116622, Peoples R China
[3] Dalian Univ, Coll Informat Engn, Dalian 116622, Peoples R China
关键词
Black hole attack; Network security; MANET; NS2; simulation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread applications of mobile Ad Hoc network (MANET), the network security is getting more and more attention. In order to achieve the simulation studies of black hole attacking the network, first, the black hole attack principles using protocol vulnerabilities are analyzed based on AODV protocol. Then, an attack model containing different types of black hole nodes is established based on NS2 network simulation platform. Finally, the impact of black hole attack on network performance is analyzed by simulation in different types and attack intensity. The simulation results show that the model can simulate the impact of black hole attack on network performance actually, which can provide reference and corresponding simulation environment for the research of Ad Hoc network security and tactical Internet information combat technology.
引用
收藏
页码:203 / 211
页数:9
相关论文
共 50 条
  • [21] Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc Networks
    Yerneni, Rajesh
    Sarje, Ani K.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [22] Simulation study of multiple black holes attack on mobile ad hoc networks
    Ramaswamy, S
    Fu, HR
    Nygard, KE
    ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 595 - 602
  • [23] A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks
    Khosa, Thabiso N.
    Mathonsi, Topside E.
    Du Plessis, Deon P.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (03) : 532 - 542
  • [24] Black Hole and Mobile Ad Hoc Network (MANET): A Simple Logical Solution
    Aljumah, Abdullah
    Ahamad, Tariq
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 9 - 12
  • [25] Black Hole Attack Prevention in Mobile Ad-hoc Network (MANET) Using Ant Colony Optimization Technique
    Khan, Dost Muhammad
    Aslam, Talal
    Akhtar, Nadeem
    Qadri, Salman
    Khan, Noman Ameer
    Rabbani, Imran Mujaddid
    Aslam, Muhammad
    INFORMATION TECHNOLOGY AND CONTROL, 2020, 49 (03): : 308 - 319
  • [26] Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
    Noguchi, Taku
    Hayakawa, Mayuko
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 539 - 544
  • [27] A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks
    Mahmood, R. A. Raja
    Khan, A. I.
    2007 INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES, 2007, : 122 - 127
  • [28] Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks: Military Perspective
    Singh, Bikramjeet
    Srikanth, Dasari
    Kumar, C. R. Suthikshn
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 810 - 814
  • [29] Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks
    Banerjee, Sukla
    WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 337 - 342
  • [30] Black Hole Attack Prevention Method Using Dynamic Threshold in Mobile Ad Hoc Networks
    Noguchi, Taku
    Yamamoto, Takaya
    PROCEEDINGS OF THE 2017 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2017, : 797 - 802