BLACK HOLE ATTACK MODEL AND SIMULATION FOR MOBILE AD HOC NETWORK

被引:0
|
作者
Ding, Yuanming [1 ,2 ]
Qu, Hao [1 ,2 ,3 ]
Li, Guang [1 ,2 ,3 ]
机构
[1] Dalian Univ, Univ Key Lab Commun & Signal Proc, 10 Xuefu St, Dalian 116622, Peoples R China
[2] Dalian Univ, Key Lab Commun Networks & Informat Proc, Dalian 116622, Peoples R China
[3] Dalian Univ, Coll Informat Engn, Dalian 116622, Peoples R China
关键词
Black hole attack; Network security; MANET; NS2; simulation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread applications of mobile Ad Hoc network (MANET), the network security is getting more and more attention. In order to achieve the simulation studies of black hole attacking the network, first, the black hole attack principles using protocol vulnerabilities are analyzed based on AODV protocol. Then, an attack model containing different types of black hole nodes is established based on NS2 network simulation platform. Finally, the impact of black hole attack on network performance is analyzed by simulation in different types and attack intensity. The simulation results show that the model can simulate the impact of black hole attack on network performance actually, which can provide reference and corresponding simulation environment for the research of Ad Hoc network security and tactical Internet information combat technology.
引用
收藏
页码:203 / 211
页数:9
相关论文
共 50 条
  • [41] Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation
    Weerasinghe, Hesiri
    Fu, Huirong
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 362 - 370
  • [42] Eliminating Selective Dropping Attack in Mobile Ad Hoc Network
    Mahdi Bounouni
    Louiza Bouallouche-Medjkoune
    Abderrahmane Beraza
    Adel Daoud
    Wireless Personal Communications, 2022, 123 : 3291 - 3308
  • [43] Wormhole Attack in Mobile Ad-hoc Network: A Survey
    Shrivastava, Akansha
    Dubey, Rajni
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 293 - 298
  • [44] Eliminating Selective Dropping Attack in Mobile Ad Hoc Network
    Bounouni, Mahdi
    Bouallouche-Medjkoune, Louiza
    Beraza, Abderrahmane
    Daoud, Adel
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (04) : 3291 - 3308
  • [45] A Model for Secure Mobile Ad Hoc Network
    Singh, Anurag
    Kumar, Manish
    Chauhan, Santosh Kumar
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [46] THE EFFECTIVENESS OF MOBILE AD HOC ROUTING PROTOCOLS UNDER A GRAY HOLE ATTACK
    Mahlous, Ahmed Redha
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (01): : 59 - 72
  • [47] Simulation framework for Mobile Ad-Hoc network
    Sha, XJ
    Tan, W
    Xu, YB
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 739 - 743
  • [48] Realistic mobility for mobile ad hoc network simulation
    Feeley, M
    Hutchinson, N
    Ray, S
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2004, 3158 : 324 - 329
  • [49] Clustering of Mobile Ad Hoc Networks: An Approach for Black Hole Prevention
    Sayner, Jitendra
    Gupta, Vinit
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 361 - 365
  • [50] Stochastic Vector Mobility Model for Mobile and Vehicular Ad Hoc Network Simulation
    Chung, Jong-Moon
    Go, Dong-Chul
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (10) : 1494 - 1507