Black-hole and DoS attack detection analysis and isolation mechanism for black-hole in MANET
1 Modern College of Business and Science, Department of Graduate Studies, Muscat, Sultanate of Oman.
2 Ninevah University, College of Electronics Engineering, Mosul, Iraq.
Review
Open Access Research Journal of Engineering and Technology, 2024, 07(01), 001–013.
Article DOI: 10.53022/oarjet.2024.7.1.0026
Publication history:
Received on 30 April 2024; revised on 25 June 2024; accepted on 28 June 2024
Abstract:
A mobile ad-hoc network is a network without infrastructure where communication between nodes occurs in an open medium, such as the air. This makes it susceptible to eavesdropping and various attacks, which can be categorized as data traffic attacks (such as black-hole, grey-hole, DoS, etc.) and control traffic attacks (such as worm-hole, hello flood, man-in-the-middle, etc.). This NS2 experimental simulation compares the disruption effects of black-hole and DoS attacks in an identical network using the AODV routing protocol. The simulation aims to observe and analyze parameters such as packet delivery fraction, end-to-end delay, normalized overhead, and residual energy in HKI-Reader. Additionally, it demonstrates how malicious nodes are detected, removed, or isolated from the network to restore it to its original state. HKI-Reader is a software application developed using PHP and JavaScript. It is designed to read simulation results files for attacks and display them in a graphical user interface (GUI) for improved analysis and visual observation.
Keywords:
Black-hole attack; DoS attack; MANET; NS2
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0