Deprecated: Creation of dynamic property TRP_Translate_Press::$plugin_optin is deprecated in /home2/sdokurer/public_html/dokurer.net/wp-content/plugins/translatepress-multilingual/class-translate-press.php on line 155

Deprecated: trim(): Passing null to parameter #1 ($string) of type string is deprecated in /home2/sdokurer/public_html/dokurer.net/wp-content/plugins/translatepress-multilingual/includes/class-url-converter.php on line 786

Deprecated: Creation of dynamic property TRP_Editor_Api_Regular_Strings::$settings is deprecated in /home2/sdokurer/public_html/dokurer.net/wp-content/plugins/translatepress-multilingual/includes/class-editor-api-regular-strings.php on line 20

Deprecated: Creation of dynamic property TRP_Editor_Api_Gettext_Strings::$settings is deprecated in /home2/sdokurer/public_html/dokurer.net/wp-content/plugins/translatepress-multilingual/includes/class-editor-api-gettext-strings.php on line 20

Deprecated: Creation of dynamic property TRP_String_Translation::$loader is deprecated in /home2/sdokurer/public_html/dokurer.net/wp-content/plugins/translatepress-multilingual/includes/string-translation/class-string-translation.php on line 21

Deprecated: Creation of dynamic property TRP_Gettext_Scan::$settings is deprecated in /home2/sdokurer/public_html/dokurer.net/wp-content/plugins/translatepress-multilingual/includes/string-translation/class-gettext-scan.php on line 7
{"id":141,"date":"2009-08-19T11:47:39","date_gmt":"2009-08-19T09:47:39","guid":{"rendered":"http:\/\/dokurer.net\/?p=141"},"modified":"2018-05-09T23:30:32","modified_gmt":"2018-05-09T20:30:32","slug":"black-hole-attack-in-wireless-ad-hoc-networks","status":"publish","type":"post","link":"http:\/\/dokurer.net\/black-hole-attack-in-wireless-ad-hoc-networks\/","title":{"rendered":"Black Hole Attack in Wireless Ad-Hoc Networks"},"content":{"rendered":"

A Wireless ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes.<\/p>\n

One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur.<\/p>\n

There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. In this work, we simulated the black hole attack in various wireless ad-hoc network scenarios and have tried to find a response system in simulations.<\/p>\n

The below links are prepared for the student who wants to study about security in Wireless Ad-hoc Networks and coders who write in NS2. You can learn how we implement a new Protocol to Ad-hoc Wireless Network in NS2 with master thesis. In the Journal, there are detailed results about the subject. The C++ Code of the Black Hole Attack and the Intrusion Detection System are in the below links. You can implement the codes, fallowing the steps in the master thesis.<\/p>\n

* Upon request, I add below the files, Blackhole and Greyhole attack with IDS solution protocols for NS2. You can not compile ns2 putting these files under appropriate folder in NS2. These files dont work as you change whole ns2 according to the information at thesis.<\/p>\n

In addition, Cygwin (and the other Linux versions) and NS2 is not installed no longer in my computer. So that, I cant answer, your request about installation error. To understand the error you encountered, I need to analyze the codes. And also, I compile the codes in NS 2.6 under Cygwin. Same code may give error in other versions. This is my request, please dont ask me the errors you encountered.<\/p>\n\n\n\n\n\n\n\n\n\n\n
Content<\/th>\nLink<\/th>\n<\/tr>\n
Master Thesis<\/td>\n[Abstract]<\/a> [\u00d6zet]<\/a>
\n
Simulation of Black Hole Attack in Wireless Ad-Hoc Network<\/a><\/td>\n<\/tr>\n
Southeastcon Journal<\/td>\nPerformance analysis of ad hoc networks under black hole attacks<\/a><\/td>\n<\/tr>\n
C++ Code<\/td>\n“Black Hole Attack to AODV Network” in NS2<\/a>
\nFile size: 36.219 bytes MD5: d30b7c6a6047607d7afe80a2df35e8d5<\/td>\n<\/tr>\n
C++ Code<\/td>\n“IDS Solution for Black Hole Attack” in NS2<\/a>
\nFile size: 35.459 bytes MD5: ef8a95e32d74b48c2fe1e5706a3fa304<\/td>\n<\/tr>\n
Zip file<\/td>\n“Black Hole Attack” in NS2<\/a>
\nFile size: 46.696 bytes MD5: a9fe75f1d3d361aa9745445aa8f606e3<\/td>\n<\/tr>\n
Zip file<\/td>\n“Grey Hole Attack” in NS2<\/a>
\nFile size: 37.850 bytes MD5: 775a99740b8f185a15c5655f76b67c40<\/td>\n<\/tr>\n
Zip file<\/td>\n“IDS Solution for Black Hole Attack” in NS2<\/a>
\nFile size: 45.835 bytes MD5: dc5b7502d58cfaaeb62789d5795e9fa8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

A Wireless ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node\u2026 Read More »<\/a><\/span><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/posts\/141"}],"collection":[{"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":14,"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":195,"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/posts\/141\/revisions\/195"}],"wp:attachment":[{"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/dokurer.net\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}