Hi,
source code to create malicious node in ns2 using tcl.
Posts: 14,118
Threads: 61
Joined: Oct 2014
Routing is the process of choosing routes through which network traffic flows. Routing is implemented in different types of networks, for example, telephone network, electronic data networks and Internet network. In electronic data networks routing uses packet-switched technology. In packet-switched networks, routing is the route for packet forwarding and also supports the transport of packets routed from source to destination through intermediate nodes using hardware devices such as routers, bridges, gateways, firewalls, or switches.
Wireless ad hoc networks are rapidly gaining popularity as a mode of communication, especially among highly mobile sectors of society. An ad hoc mobile network (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. As a result, these networks are relatively easy to deploy and use for a very short time, for example in both personal and business applications.
In addition to providing a convenient mode of communication for civil and commercial purposes, wireless ad hoc networks are highly desirable for use in war zones, remote area relief efforts and emergency situations in areas affected by disasters. In such cases, where there is no network infrastructure, a mobile ad hoc network can provide a crucial mode of communication.
Mobile devices in ad hoc networks communicate with each other through a multi-hop route using cooperating intermediate nodes. A high level of cooperation is essential for applications requiring real-time data transmission, such as soldiers transmitting information on a battlefield. However, the limited power supply of mobile devices raises doubts about the ability of each node to be fully cooperative. As a result, packet delivery can not be guaranteed even when malicious nodes are not present, and data forwarding packets do not provide a good solution.
If malicious nodes are present in a MANET, they can try to reduce network connectivity (and thus undermine network security) by pretending to be cooperative, but in effect discarding any data that is intended to be transmitted. These actions can result in defragmented networks, isolated nodes and drastically reduced network performance. Our objective is to evaluate the added effect of the presence of malicious nodes on the performance of the ad hoc network, and to determine the appropriate measures to detect malicious nodes.