Skip to main content

Installing ns-3.37 and ns-3.35 in Ubuntu | Ubuntu 22.04 | NS3

Multiple Versions of ns3 in Ubuntu 22.04 In this post, we are going to install two versions of ns3 namely ns-3.35 and ns-3.37  My OS is : Ubuntu 22.04 LTS (Long Term Support) ns-3.35 uses waf and (./waf --run scratch/first)  ns-3.37 uses cmake  (./ns3 run scratch/first.cc) So we will install both the packages  Go through the video for complete instructions To start with  $ sudo apt update  $ sudo apt install build-essential autoconf automake libxmu-dev g++ python3 python3-dev pkg-config sqlite3 cmake python3-setuptools git qtbase5-dev qtchooser qt5-qmake qtbase5-dev-tools gir1.2-goocanvas-2.0 python3-gi python3-gi-cairo python3-pygraphviz gir1.2-gtk-3.0 ipython3 openmpi-bin openmpi-common openmpi-doc libopenmpi-dev autoconf cvs bzr unrar gsl-bin libgsl-dev libgslcblas0 wireshark tcpdump sqlite sqlite3 libsqlite3-dev  libxml2 libxml2-dev libc6-dev libc6-dev-i386 libclang-dev llvm-dev automake python3-pip libxml2 libxml2-dev libboost-all-dev  I have downloaded both the versions of ns3 fr

Blackhole attack in ns2 - NS2 Tutorial # 12

How to add a black hole attack in AODV protocol in ns2.

https://www.nsnam.com 

Black hole is the basic attack in a network, here we are going mitigate this attack in ns2.

Trust value, based on the trust value, if the value is less, then we can make it as an attacker node.

High trust, medium trust and low trust (integer)

Trusted or not (boolean)

To make a node attacker node (preferanly a black hole attack, how to do that?)

AODV protocol as it is easy to implement in ns2.


Step 1: Declare the attacker variable
We will two files aodv.h and aodv.cc files 
in aodv.h file, 
create a variable name as given below in the protected scope

bool attacker;

Step 2: initialise the attacker variable as false.
In aodv.cc file, initialise the attacker to be false inside the constructor.


Step 3: if a node is a blackhole, what happens to attacker value
in the command() function of aodv.cc file inside the block 
if(argc==2), include the following lines

if(strncasecmp(argv[1], "blackhole") == 0) {
attacker=true;
      return TCL_OK;
    }

Step 4: If the node is an attacker node, what it will do?
if(attacker==true)
{
printf("Packets dropped by node number %d is %d \n",index,t_count++);
drop(p,DROP_RTR_ROUTE_LOOP);
}


Open the terminal and go to ~ns-2.35/ and execute the command 

$] make 

If no errors, in the above logic your compilation is successful.

Step 5: Run the TCL file with AODV protocol, with Attacker code and without attacker code and compare both the results.

$] ns AODV.tcl

You can compare the node with attacker and without attacker
Here is the comparison for an attacker node (node number 5)

When node 5 was an Attacker node, these are the results
Number of generated packets: 4
Number of sent packets: 2
Number of forwarded packets: 2
Number of received packets: 22
Number of dropped packets: 16
Number of lost packets: 0
Number of sent bytes: 204
Number of forwarded bytes: 88
Number of received bytes: 1000
Number of dropped bytes: 472
Minimal packet size: 40
Maximal packet size: 102
Average packet size: 49.6923

When node 5 was a good node, here is the result

Number of generated packets: 446
Number of sent packets: 446
Number of forwarded packets: 443
Number of received packets: 465
Number of dropped packets: 0
Number of lost packets: 0
Number of sent bytes: 373736
Number of forwarded bytes: 347724
Number of received bytes: 348764
Number of dropped bytes: 0
Minimal packet size: 32
Maximal packet size: 1598
Average packet size: 790.4165

You can watch for my forthcoming video (preferably tomorrow) on Tracegraph. Which is used in this tutorial.

Thanks for watching...
Subscribe to my channel and share it to your friends 

Spread the knowledge..

Youtube.com/tspradeepkumar
https://www.nsnam.com 

Stay Tuned...


T S Pradeep Kumar

Comments

  1. I did see the source code for blackhole attack??? where is it Please????

    ReplyDelete
    Replies

    1. https://drive.google.com/open?id=1LFRrmJM3YXiQT3X1HMSFyS9T9d8oWlIx

      Delete
  2. Hello sir, Thank you so much for this video.
    can i download the source codes please?
    if yes , Then how?
    please sir give the download the source codes link

    ReplyDelete
  3. I am facing difficulties trying to download the codes. any help??

    ReplyDelete
  4. Please help me
    ns: _o40 blackhole:
    (_o40 cmd line 1)
    invoked from within
    "_o40 cmd blackhole"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]

    ReplyDelete
  5. ns: _o40 blackhole :
    (_o40 cmd line 1)
    invoked from within
    "_o40 cmd blackhole"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]
    global errorInfo
    set savedInfo $errorInfo
    error "error when calling class $cls: $args" $..."
    (procedure "_o40" line 2)
    (SplitObject unknown line 2)
    invoked from within
    "_o40 blackhole "
    i am getting this error while implementing black hole attack kidnly help me

    ReplyDelete
  6. Respected sir i've followed the above procedure but getting this error.
    Kindly help me out of this error, I shall be very thankful to you.
    saifullah@saifullah-Inspiron-3542:~$ ns AODV.tcl
    num_nodes is set 17
    INITIALIZE THE LIST xListHead
    ns: _o63 blackhole:
    (_o63 cmd line 1)
    invoked from within
    "_o63 cmd blackhole"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]
    global errorInfo
    set savedInfo $errorInfo
    error "error when calling class $cls: $args" $..."
    (procedure "_o63" line 2)
    (SplitObject unknown line 2)
    invoked from within
    "_o63 blackhole"

    ReplyDelete
  7. Sir, respectfully, I hope you could at least reply comments because some of us actually followed the exact same thing as you did, but the output wasn't the same.

    ReplyDelete
  8. Sir, Can i apply the same method to simulate Blackhole attack in Proactive routing protocols like DSDV and FSR.

    ReplyDelete
  9. How would i apply blackhole attack in proactive routing protocol ?

    ReplyDelete
  10. sir please, how i can simulate blackhole attack in leach protocol

    ReplyDelete
  11. Getting same error sir, please help
    _o40 blackhole :
    (_o40 cmd line 1)
    invoked from within
    "_o40 cmd blackhole"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]
    global errorInfo
    set savedInfo $errorInfo
    error "error when calling class $cls: $args" $..."
    (procedure "_o40" line 2)
    (SplitObject unknown line 2)
    invoked from within
    "_o40 blackhole "

    ReplyDelete
  12. num_nodes is set 17
    INITIALIZE THE LIST xListHead
    ns: _o132 malicious:
    (_o132 cmd line 1)
    invoked from within
    "_o132 cmd malicious"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]
    global errorInfo
    set savedInfo $errorInfo
    error "error when calling class $cls: $args" $..."
    (procedure "_o132" line 2)
    (SplitObject unknown line 2)
    invoked from within
    "_o132 malicious"
    how can I resolve this please

    ReplyDelete
  13. num_nodes is set 17
    INITIALIZE THE LIST xListHead
    ns: _o132 malicious:
    (_o132 cmd line 1)
    invoked from within
    "_o132 cmd malicious"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]
    global errorInfo
    set savedInfo $errorInfo
    error "error when calling class $cls: $args" $..."
    (procedure "_o132" line 2)
    (SplitObject unknown line 2)
    invoked from within
    "_o132 malicious"
    please help me solve this problem

    ReplyDelete
  14. Hello sir,
    can you provide the code for better understanding. In the drive basic code is there. Thank you

    ReplyDelete
  15. hi sir, where have malicious coding in tcl. please check your coding. I cant able to see in malcious.tcl

    ReplyDelete
    Replies
    1. Its there in the Google Drive given....

      Delete
    2. There is not AODV.tcl in youre Google Drive

      Delete
    3. https://drive.google.com/drive/folders/1B4HN87qBg8Pc5LpfWq6ldOSe33ZYtv-6

      Delete
  16. respected sir, sir your drive link is not opening.it is showing "The requested URL was not found on this server. That’s all we know." when we click the link . Sir please provide us the correct drive link

    ReplyDelete

Post a Comment

Popular posts from this blog

Installation of NS2 (ns-2.35) in Ubuntu 20.04

Installation of NS2 (ns-2.35) in Ubuntu 20.04 LTS Step 1: Install the basic libraries like      $] sudo apt install build-essential autoconf automake libxmu-dev Step 2: install gcc-4.8 and g++-4.8 open the file using sudo mode $] sudo nano /etc/apt/sources.list Include the following line deb http://in.archive.ubuntu.com/ubuntu bionic main universe $] sudo apt update $] sudo apt install gcc-4.8 g++-4.8 Step 3:  Unzip the ns2 packages to home folder $] tar zxvf ns-allinone-2.35.tar.gz $] cd ns-allinone-2.35/ns-2.35 Modify the following make files. ~ns-2.35/Makefile.in Change @CC@ to gcc-4.8 change @CXX@ to g++-4.8 ~nam-1.15/Makefile.in ~xgraph-12.2/Makefile.in ~otcl-1.14/Makefile.in Change in all places  @CC@ to gcc-4.8 @CPP@ or @CXX@ to g++-4.8 open the file: ~ns-2.35/linkstate/ls.h Change at the Line no 137  void eraseAll() { erase(baseMap::begin(), baseMap::end()); } to This void eraseAll() { this->erase(baseMap::begin(), baseMap::end()); } All changes made Step 4: Open a new termi

Installing ns3 in Ubuntu 22.04 | Complete Instructions

In this post, we are going to see how to install ns-3.36.1 in Ubuntu 22.04. You can follow the video for complete details Tools used in this simulation: NS3 version ns-3.36.1  OS Used: Ubuntu 22.04 LTS Installation of NS3 (ns-3.36.1) There are some changes in the ns3 installation procedure and the dependencies. So open a terminal and issue the following commands Step 1:  Prerequisites $ sudo apt update In the following packages, all the required dependencies are taken care and you can install all these packages for the complete use of ns3. $ sudo apt install g++ python3 python3-dev pkg-config sqlite3 cmake python3-setuptools git qtbase5-dev qtchooser qt5-qmake qtbase5-dev-tools gir1.2-goocanvas-2.0 python3-gi python3-gi-cairo python3-pygraphviz gir1.2-gtk-3.0 ipython3 openmpi-bin openmpi-common openmpi-doc libopenmpi-dev autoconf cvs bzr unrar gsl-bin libgsl-dev libgslcblas0 wireshark tcpdump sqlite sqlite3 libsqlite3-dev  libxml2 libxml2-dev libc6-dev libc6-dev-i386 libclang-dev llvm-

VPL Jail Server Installation | Virtual Programming Laboratory with Moodle

Virtual Programming Laboratory (VPL)  This post tells you how to install VPL Jail Server Installation in Ubuntu 20.04 and how to configure it using Moodle Learning Management System. VPL - Virtual Programming Laboratory  For full installation with complete description, follow the video What is VPL? VPL is Virtual Programming Laboratory which is a tool for programming assignments, evaluation and running of programs. The programming languages supported by VPL is C, C++, Java, Python, Perl, PHP, NodeJS, Verilog, etc. Step 1 - Install  VPN Jail Server Installation  My Server configuration  16GB RAM and 16 Core PRocessor (Intel Xeon)  Virtual Machine  Ubuntu 20.04 (64 bit OS). To download the softwares  https://vpl.dis.ulpgc.es/index.php/home/download  Unzip or untar the above file in the home folder (in my case it is /home/tspradeepkumar/ ) $ cd vpl-jail-system-2.7.2/ $ sudo ./install-vpl-sh VPL Jail Server Installation This will take some time based on your internet connection: To Star