Dear Researching Community,

Currently, I am making a research on wireless sensor networks security in which I should present some complicated internal routing attacks and their effects on the networks in which they are implemented.

One of the attacks I have chosen for the needs of this research is a classic scheme of a wormhole attack in which:

There are two legitimate nodes - adversaries: the first one is neighbor of the source node and the second one neighbor of the destination node.

The tool used is the old - fashioned ns-2 (network simulator 2).

Because of the limited sources on ns-2 implementations, I would be much helped if someone could share some part of his/her work, or some guideline, on how to apply a wormhole attack in AODV routing protocol.

Thank you for your time,

Bill

Similar questions and discussions