Dear Researching Community,
Currently, I am making a research on wireless sensor networks security in which I should present some complicated internal routing attacks and their effects on the networks in which they are implemented.
One of the attacks I have chosen for the needs of this research is a classic scheme of a wormhole attack in which:
There are two legitimate nodes - adversaries: the first one is neighbor of the source node and the second one neighbor of the destination node.
The tool used is the old - fashioned ns-2 (network simulator 2).
Because of the limited sources on ns-2 implementations, I would be much helped if someone could share some part of his/her work, or some guideline, on how to apply a wormhole attack in AODV routing protocol.
Thank you for your time,
Bill