Abstract

A mobile ad-hoc network is a network without infrastructure where communication between nodes occurs in an open medium, such as the air. This makes it susceptible to eavesdropping and various attacks, which can be categorized as data traffic attacks (such as black-hole, grey-hole, DoS, etc.) and control traffic attacks (such as worm-hole, hello flood, man-in-the-middle, etc.). This NS2 experimental simulation compares the disruption effects of black-hole and DoS attacks in an identical network using the AODV routing protocol. The simulation aims to observe and analyze parameters such as packet delivery fraction, end-to-end delay, normalized overhead, and residual energy in HKI-Reader. Additionally, it demonstrates how malicious nodes are detected, removed, or isolated from the network to restore it to its original state. HKI-Reader is a software application developed using PHP and JavaScript. It is designed to read simulation results files for attacks and display them in a graphical user interface (GUI) for improved analysis and visual observation.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.