Black Hole Attack on an AODV Routing Protocol

241 views
Skip to first unread message

nagy....@fa-hists.edu.eg

unread,
Aug 3, 2014, 5:35:52 AM8/3/14
to ns-3-...@googlegroups.com
how run Black Hole Attack on an AODV Routing Protocol in ns3

Tommaso Pecorella

unread,
Aug 3, 2014, 6:03:59 AM8/3/14
to ns-3-...@googlegroups.com
You develop a node performing a Black Hole attack. That's how.
To answer some more questions:
1) no, there's no "pre-done" code.
2) no, there's no example on how to write a malicious node.
3) yes, this topic has been discussed far too many times.

T.

nagy....@fa-hists.edu.eg

unread,
Aug 4, 2014, 6:27:05 AM8/4/14
to ns-3-...@googlegroups.com


On Sunday, August 3, 2014 11:35:52 AM UTC+2, nagy....@fa-hists.edu.eg wrote:
how run Black Hole Attack on an AODV Routing Protocol in ns3
 please  i want code to create a malicious node.
and where put this code in aodv routing protocol.
thanks for help

Tommaso Pecorella

unread,
Aug 4, 2014, 1:30:54 PM8/4/14
to ns-3-...@googlegroups.com
This is the kind of message I am tempted to reply to in the following way:
"Sure thing. My hourly fee is 120€ per hour. The estimated time to complete this task is about a week (8*5) hours (the exact time may vary)."

Fortunately (or unfortunately) it is a joke and not a serious offer.

However, I have a question. Did you understand what I wrote to you have just read the message without understanding ?
"no, there's no "pre-done" code." means "go ahead and develop it".

Maybe there's a language issue here, because "I want code to create a malicious node." means "Please, somebody can develop it for me and send it?".
The answer is, of course, no.
There are too many assumptions about the attacker and the way the attack is performed to make the code useful to anyone (beside who's developing it). As a consequence, there's no interest in developing a general model and include it in ns-3. That's why there's no module performing what you're asking for, and whoever did it... probably he/she is not keen in sharing the work already done with people just willing to use it.

Happy coding.

T

Shalini

unread,
Dec 20, 2014, 10:45:52 PM12/20/14
to ns-3-...@googlegroups.com
The patch for malicious AODV and a sample example for demonstration is available here.

http://mohittahiliani.blogspot.in/2014/12/ns-3-blackhole-attack-simulation-in-ns-3.html

Hope it helps.

Tommaso Pecorella

unread,
Dec 21, 2014, 1:51:58 AM12/21/14
to ns-3-...@googlegroups.com
Hi,

thanks for the contribution, it is very appreciated.
Two questions:
1) did you think to generalize the approach (i.e., to move the malicious code to the IP layer) ? This would make it work for most routing protocols (except a few ones)
2) Given the user's interest in this kind of attacks, it could be worth merging it with the main ns-3 repos. What do you think ?

Cheers,

T.

Mohit P. Tahiliani

unread,
Dec 22, 2014, 6:39:26 AM12/22/14
to ns-3-...@googlegroups.com
Hi Tommaso,

I am Mohit P. Tahiliani, Shalini's mentor while she worked on designing a patch for Blackhole attack in ns-3.

First of all, I would like to Thank you for providing your feedback about her work and helping her by replying to her queries.

Regarding the two questions, following are the replies:

1. We did not think of generalising it but it is certainly a very good suggestion! We shall try doing that and get back to the mailing list.

2. We would be very glad if this patch (or even the generalised one) can be merged with the main ns-3 repositories. We will set up a repository and put up the code for testing / review.

Best Regards,
Mohit P. Tahiliani
Reply all
Reply to author
Forward
0 new messages