Regarding to attach on leach protocol

39 views
Skip to first unread message

Rakesh Patel

unread,
May 9, 2019, 3:30:23 PM5/9/19
to Network Simulator 2 (NS2)
Can we directly intrude the LEACH protocol by wormhole, sinkhole or blackhole attack??


Please reply to me ASAP Knudfl sir.

Sir, please..

knudfl

unread,
May 9, 2019, 4:05:00 PM5/9/19
to Network Simulator 2 (NS2)
Hi.

Attacks : I have never seen any examples of changes to {the MIT Leach or the Mannasim Leach} code.
Have you searched the Net ?

knudfl

unread,
May 9, 2019, 5:51:33 PM5/9/19
to Network Simulator 2 (NS2)
The MIT Leach : I guess you can add  "blackholeaodv", and run the two "start up files" with AODV protocol.
May work,  or may not work.

              // wireless-demo-csci694.tcl ,  line 53
53:    set opt(adhocRouting)   AODV


             
// wireless.tcl
60:    set opt(rp)             AODV            ;# routing protocol script
255:   if { [string compare $opt(rp) "aodv"] == 0} {
257:          aodv-create-mobile-node $i
259:   } elseif { [string compare $opt(rp) "aodv"] == 0} {
261:          aodv-create-mobile-node $i
.... Runs OK with this (no blackhole added to 'ns' and to the tcl files)
.... leach.out shows :   Total Alive = 97
leach-pegasis-ns_2.34-ubuntu10_i386.deb → /usr/local/bin/ns   was used.


You can build ns-2.34 with `leach+pegasis_ns234.patch´ :  On the 32bit Ubuntu 10.04 - i386 (or earlier versions.)

Blackhole :   blackholeaodv2013-ns234_4.patch

Note :   I have no idea how you can monitor a blackholeaodv attack  in leach.


knudfl

unread,
May 9, 2019, 5:53:23 PM5/9/19
to Network Simulator 2 (NS2)
The file "leach.out" from the above setup is attached.
leach.out

Rakesh Patel

unread,
May 9, 2019, 11:45:17 PM5/9/19
to Network Simulator 2 (NS2)
Here I am working on the detection of attack in LEACH protocol via a watchdog mechanism.

So my actual is problem is that we can intrude the Leach protocol with the help of an ad-hoc routing protocol.

Rakesh Patel

unread,
May 9, 2019, 11:50:46 PM5/9/19
to Network Simulator 2 (NS2)
But sir can I intrude the LEACH protocol with the help of ad-routing protocol.

set val(chan)           Channel/WirelessChannel     ;
set val(prop)           Propagation/TwoRayGround    ;
set val(netif)          Phy/WirelessPhy             ;
set val(mac)            Mac/802_11                  ;
set val(mac1)           Mac/802_11                  ;
set val(ifq)            CMUPriQueue     ;
set val(ifq1)           CMUPriQueue     ;
set val(ll)             LL                          ;
set val(ll1)            LL                          ;
set val(ant)            Antenna/OmniAntenna         ;
set val(ifqlen)         250                         ;
set val(ifqlen1)        250                         ;
set val(nn)             54                          ;
set val(rp)             DSR                         ;
set val(rp1)            LEACH                       ;
set val(x) 1500     ;
set val(y) 1500     ;
set opt(energymodel)    EnergyModel              ;
set opt(radiomodel)     RadioModel                  ;


Here in this, I am contaminating the leach via sinkhole attack with the help of DSR routing protocol.

Is it possible??

Sir your reply will be appreciated.
Reply all
Reply to author
Forward
0 new messages