NS2-Based Black Hole Attack Modeling and Simulation of Ad Hoc Network

Article Preview

Abstract:

Taking the AODV protocol as an example, the attack characteristics of different types of black holes are analyzed. Then, an attack model of black hole is established. Finally, the effects of black hole attacks to network performance are analyzed by simulations in different types and intensities. The simulation results show that this model can accurately simulate the impact of black hole attack on network performance and can provide reference and corresponding simulation environment for the security research of Ad Hoc network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1697-1700

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] L. Abusalah, A. Khokhar and M. Guizani: IEEE Communication Surveys & Tutorials, Vol. 10 (2008), p.78.

Google Scholar

[2] J. H. Song, F. Hong and X. B. He: Micro Computer Applications, Vol. 28 (2007), p.454.

Google Scholar

[3] M. Wang and M. Wu: Journal on Communications, Vol. 26 (2005), p.106.

Google Scholar

[4] J. X. Wang, Y. N. Zhang and Z. Xie: Journal of Circuits and Systems, Vol. 10 (2005), p.93.

Google Scholar

[5] X. Y. Wang, Z. H. Lin and Y. Hu: Journal of Naval University of Engineering, Vol. 23 (2011), p.103.

Google Scholar

[6] C. X. Zhao, R. C. Wang, H. P. Huang and Y. M. Ji: Computer Engineering and Applications, Vol. 46 (2010), p.81.

Google Scholar

[7] Q. Y. Liu, P. Yi, X. H. Jiang and J. H. Li: Computer Simulation, Vol. 25 (2008), p.146.

Google Scholar

[8] F. Ameza, N. Assam and R. Beghdad: International Journal of Computer Science and Information Security, Vol. 8 (2010), p.112.

Google Scholar

[9] M. Ghonge and S. U. Nimbhorkar: International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2 (2012).

Google Scholar