Visible to the public Simulation of MANET's Single and Multiple Blackhole Attack with NS-3

TitleSimulation of MANET's Single and Multiple Blackhole Attack with NS-3
Publication TypeConference Paper
Year of Publication2018
AuthorsSbai, Oussama, Elboukhari, Mohamed
Conference Name2018 IEEE 5th International Congress on Information Science and Technology (CiSt)
Keywordsad hoc nature, Ad hoc networks, AODV protocol, battery power, Blackhole attack, central authority, delays, dynamic topologies, fixed infrastructure, IEEE 802.11ac protocol, industrial fields, MANET, memory space, mobile ad hoc networks, Mobile ad hoc networks (MANETs), mobile ad-hoc networks, mobile computing, mobile radio, mobility model, multiple Blackhole attack, network nodes, Network security, NS-3 simulator, NS-3.27 simulator, OLSRprotocol, physical protection, pubcrawl, Relays, Resiliency, Routing, Routing protocols, Scalability, single Blackhole attack, telecommunication network topology, telecommunication security, wireless LAN
AbstractMobile Ad-hoc Networks (MANETs) have gained popularity both in research and in industrial fields. This is due to their ad hoc nature, easy deployment thanks to the lack of fixed infrastructure, self-organization of its components, dynamic topologies and the absence of any central authority for routing. However, MANETs suffer from several vulnerabilities such as battery power, limited memory space, and physical protection of network nodes. In addition, MANETs are sensitive to various attacks that threaten network security like Blackhole attack in its different implementation (single and multiple). In this article, we present the simulation results of single and multiple Blackhole attack in AODV and OLSR protocols on using NS-3.27 simulator. In this simulation, we took into consideration the density of the network described by the number of nodes included in the network, the speed of the nodes, the mobility model and even we chose the IEEE 802.11ac protocol for the pbysicallayer, in order to have a simulation, which deals with more general and more real scenarios. To be able to evaluate the impact of the attack on the network, the Packet delivery rate, Routing overhead, Throughput and Average End to End delay have been chosen as metrics for performance evaluation.
DOI10.1109/CIST.2018.8596606
Citation Keysbai_simulation_2018