A mobile ad-hoc network is a network without infrastructure where communication between nodes occurs in an open medium, such as the air. This makes it susceptible to eavesdropping and various attacks, which can be categorized as data traffic attacks (such as black-hole, grey-hole, DoS, etc.) and control traffic attacks (such as worm-hole, hello flood, man-in-the-middle, etc.). This NS2 experimental simulation compares the disruption effects of black-hole and DoS attacks in an identical network using the AODV routing protocol. The simulation aims to observe and analyze parameters such as packet delivery fraction, end-to-end delay, normalized overhead, and residual energy in HKI-Reader. Additionally, it demonstrates how malicious nodes are detected, removed, or isolated from the network to restore it to its original state. HKI-Reader is a software application developed using PHP and JavaScript. It is designed to read simulation results files for attacks and display them in a graphical user interface (GUI) for improved analysis and visual observation.
Read full abstract