Simulation-of-AODV-Routing-with-Blackhole-Attack

버전 1.0.0 (2.49 KB) 작성자: Atanu Bera
A simulation illustrating AODV routing protocol behavior in MANETs, with emphasis on blackhole attack detection and mitigation.
다운로드 수: 20
업데이트 날짜: 2024/4/24

Simulation of AODV Routing with Blackhole Attack

This project simulates a mobile ad hoc network (MANET) using the Ad-hoc On-demand Distance Vector (AODV) routing protocol and investigates its vulnerability to blackhole attacks. AODV is implemented to establish routes between nodes, while a blackhole node is introduced to intercept and potentially disrupt communication. Through visualization, the simulation demonstrates the impact of the blackhole attack on routing paths, comparing routes with and without the presence of the malicious node. This project serves as an educational tool to understand the behavior of routing protocols in the face of security threats, offering insights into strategies for mitigating such attacks in MANETs.

  • Blockchain-Enabled <-- Checkout Simulation of Blockchain-Enabled AODV Routing Preventing from Blackhole-Attack from here

  • Both are Same Code but this one is contain Blackhole-Attack Simulation only.

Simulation

Output Explanation

The lines "Route without blackhole" and "Route with blackhole" indicate the paths followed by data packets from the source node to the destination node in the simulated network, both in the absence and presence of a blackhole attack, respectively.

  • Route without blackhole :
  1. This line indicates the path taken by data packets when there is no blackhole node in the network.
  2. In this case, the route consists of two nodes: node 1 (the source node) and node 20 (the destination node).
  3. The data packets are successfully transmitted from the source node (node 1) to the destination node (node 20) without encountering any disruption or interference.
  • Route with blackhole :
  1. This line indicates the path taken by data packets when a blackhole node is present in the network.
  2. In this case, the route consists of three nodes: node 1 (the source node), node 20 (the destination node), and node 10 (the blackhole node).
  3. The data packets, instead of being routed directly from the source node to the destination node, are diverted through the blackhole node (node 10).
  4. This diversion is characteristic of a blackhole attack, where the malicious node intercepts and drops or alters data packets, disrupting communication between legitimate nodes.

Nodes

The nodes are visually distinguished by three different colors: red, blue, and green. Let's explain the significance of each color:

  • Red Nodes: The source node and destination node are both represented by red color. These nodes are crucial in routing protocols as they represent the starting point (source) and the destination of data packets.
  • Blue Nodes: Nodes along the route without a blackhole are represented by blue color. These nodes are part of the shortest path between the source and destination nodes in the absence of any malicious activity.
  • Green Nodes: The blackhole node is represented by green color. This node is introduced into the network as part of the simulation to mimic a malicious node that disrupts communication by dropping or altering packets.

Installation

Add this blackhole.m in your matlab and run it

blackhole.m

Authors

인용 양식

Atanu Bera (2024). Simulation-of-AODV-Routing-with-Blackhole-Attack (https://github.com/atanu16/Simulation-of-AODV-Routing-with-Blackhole-Attack), GitHub. 검색 날짜: .

MATLAB 릴리스 호환 정보
개발 환경: R2024a
모든 릴리스와 호환
플랫폼 호환성
Windows macOS Linux

Community Treasure Hunt

Find the treasures in MATLAB Central and discover how the community can help you!

Start Hunting!

GitHub 디폴트 브랜치를 사용하는 버전은 다운로드할 수 없음

버전 게시됨 릴리스 정보
1.0.0

이 GitHub 애드온의 문제를 보거나 보고하려면 GitHub 리포지토리로 가십시오.
이 GitHub 애드온의 문제를 보거나 보고하려면 GitHub 리포지토리로 가십시오.