Re: Attacks IoT or WSN

141 views
Skip to first unread message
Message has been deleted

Jack Higgins

unread,
Mar 26, 2024, 7:14:21 AM3/26/24
to ns-3-users
You will not find attacks in ns-3 based code as it only implements the specifications of the standards.

You can implement attacks by modifying the base code if you know what you are doing.

I suggest:

a) Read the documentation of ns-3 to learn how to use it
b) Read papers on WSN-specific attacks to understand how they work and then you can implement them in Ns-3.

You might find source code in the net of people implementing attacks, but chances are that these are running
in very old versions of ns-3. I would implement them in the newest version of ns-3 which might have support for more features
and protocols.

Regards,

Al.

On Monday, March 11, 2024 at 2:42:24 AM UTC+1 Ina wrote:
Hello, please can someone help me where I find attacks on the IoT or wsn developed on NS3. thanks
Message has been deleted

*Shahid*

unread,
Mar 28, 2024, 8:50:39 PM3/28/24
to ns-3-...@googlegroups.com
In the attack, we have to create a scenario that increases the packet loss and delay. For this, you can use any method that affects the original network transmission.

On Wed, Mar 27, 2024 at 7:40 PM Moussa <mouss...@gmail.com> wrote:
thanks a lot for the advice. do you know of any wsn attack code already implemented. I would like to do a study of code already implemented. regarding the version I will manage. thanks in advance


--
Posting to this group should follow these guidelines https://www.nsnam.org/wiki/Ns-3-users-guidelines-for-posting
---
You received this message because you are subscribed to a topic in the Google Groups "ns-3-users" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/ns-3-users/4xVl4PPslF8/unsubscribe.
To unsubscribe from this group and all its topics, send an email to ns-3-users+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ns-3-users/a3d6892c-5677-4e5b-b2b1-673e07b4f528n%40googlegroups.com.

--
Posting to this group should follow these guidelines https://www.nsnam.org/wiki/Ns-3-users-guidelines-for-posting
---
You received this message because you are subscribed to the Google Groups "ns-3-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ns-3-users+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ns-3-users/CAOuCO2x7E%2BFJBR%2B0F1QdkoNZYjDZftAuek1FU-rG4DwKC1tLZQ%40mail.gmail.com.

Tommaso Pecorella

unread,
Mar 28, 2024, 9:07:45 PM3/28/24
to ns-3-users
We can't really help with assignments - and your tutor could be reading this thread...
Message has been deleted

Tommaso Pecorella

unread,
Mar 29, 2024, 8:27:52 PM3/29/24
to ns-3-users
@Lna: good to know, then we can discuss freely.

The answer is: it depends on the attack. Usually attack models are not included in ns-3 as, like Jack said, ns-3 is more focused on the "right" behavior. However, it is fairly simple (let's say, very easy), to simulate:
- Sybil attack (very easy, you can force MAC addresses on a NetDevice, or install thousands of NetDevices in a node)
- Replay attacks
- Black / Gray hole attacks
- Wormhole attacks (selective or blanket)
- Packet reordering attacks
- ARP/NDP spoofing
- TCP reset

and the list is only about the ones I could implement in less than half an hour (mileage might vary, I know where to change the code).

What cannot be done so easily are attacks to the authentication protocols or to the crypto, as authentication mechanisms are not implemented, and crypto can be implemented, but it's usually not used.

In the contrary, appropriate countermeasures to attack are **very** tricky to implement. Not because they're hard to implement (they're not that hard), but because the researchers are tempted to access internal states that are not known for real. E.g., suppose you want to know how many packets a node has forwarded (it's often used as a very questionable approach to mitigate attacks to routing). In ns-3 you can "inspect" a neighbor node to get such a value - but in a real system you can't. Hence, in ns-3 you can implement a "all-knowing" method, which is - of course - not feasible in a real system.

Summarizing:
- What are the attacks that are implemented in ns-3? None in the "main" ns-3 repository.
- What are the attacks that can be easily implemented in ns-3? Any attack involving routing, protocols message thwarting, L3/L4 attacks, and even (sorry, forgot to add to the list) Jamming attacks.
- What is extremely hard or next-to-impossible to implement? DoS and DDoS (actually any resource exhaustion attack).



On Friday 29 March 2024 at 20:41:02 UTC+1 Ina wrote:
thank you for the response. my tutor can read without problem since it is a chapter dedicated to existing NS3 attacks. i.e. already implemented. if there are any other tips that will be useful to me.

Message has been deleted

Tommaso Pecorella

unread,
Mar 30, 2024, 6:30:26 AM3/30/24
to ns-3-users
On this matter I'd suggest to check the available models in ns-3, that's the best way to understand.
My list could be quite long and complicated... like a 6-pages paper.

Honestly, the best thing would be to refer to a published paper - but I can't point you to one right now, for copyright reasons.

On Saturday 30 March 2024 at 02:19:30 UTC+1 Ina wrote:
Thank you mr Tommaso 🤝
 
I am satisfied with your answer now my question is to know about iot or wsn (what does an iot network on ns-3 consist of like architecture, devices ,…)
Reply all
Reply to author
Forward
0 new messages