What is Black Hole Attack?How Black Hole attack is implemented using NS2?
In Routing Protocol,a malicious node advertise itself as a shortest path routing protocol. NS2 is best suited for implementing black hole attack.
Types of black hole attack:
- Collaborative black hole mechanism.
- Single black hole.
- External black hole attack.
- Internal black hole attack.
Detection mechanisms for Implementing NS2 Black Hole Attack :
Time based threshold detection method.
DPRAODV.
BDSR.
Neighborhood based and routing discovery.
Random two-hop ACK and Bayesians detection scheme.
Redundant route and unique sequence number scheme.
REAct.
IDS based on ADM.
Hash based hashed base.
Architecture of black hole attack:
Journal Support for NS2 Projects:
Download Sample Source Code for Black Hole Attack using NS2
else if(index==malicious1)
{
seqno = max(seqno, rq->rq_dst_seqno)+1;
if (seqno%2) seqno++;
sendReply(rq->rq_src, // IP Destination
1, // Hop Count
rq->rq_dst, seqno, MY_ROUTE_TIMEOUT,
rq->rq_timestamp); // timestamp
//rt->pc_insert(rt0->rt_nexthop);
Packet::free(p);
}
else if(index==malicious2)
{
seqno = max(seqno, rq->rq_dst_seqno)+1;
if (seqno%2) seqno++;
sendReply(rq->rq_src, // IP Destination
1, // Hop Count
rq->rq_dst, seqno, MY_ROUTE_TIMEOUT,
rq->rq_timestamp); // timestamp
//rt->pc_insert(rt0->rt_nexthop);
Packet::free(p);
}
else if(index==malicious3)
{
seqno = max(seqno, rq->rq_dst_seqno)+1;
if (seqno%2) seqno++;
sendReply(rq->rq_src, // IP Destination
1, // Hop Count
rq->rq_dst,
seqno,
MY_ROUTE_TIMEOUT,
rq->rq_timestamp); // timestamp
//rt->pc_insert(rt0->rt_nexthop);
Packet::free(p);
}


