Skip to main content

MANET Routing Protocols using ns3

#AODV #OLSR #MANETs #DSDV #DSR

Download the Code here: 
https://drive.google.com/open?id=1OkVOsifjN9UfQjPGvfR7OuS-x_GBRgCV

Check the Video for Detailed instruction and how to use the plots, graphs and source code.


Comparison of MANET routing Protocols 1. AODV
2. DSDV
3. DSR
4. OLSR
using NS3 (Network Simulator 3)
B.Tech, M.Tech, PhD...
1. Reactive Vs Proactive routing
2. PErformance comparison of MANET protocols
3. AODV Vs DSDV Comparison

https://www.nsnam.com and also at my channel.

What Version: ns-3.29
My Ubunut OS is: Ubuntu 18.04

This file we are going to use for our simulation:
/home/networks/ns-allinone-3.29/ns-3.29/examples/routing/manet-routing-compare.cc

Once you under stand the code, now lets run this example

Step 1: Copy the above file in to ~ns-3.29/scratch/ folder

Step 2: Understand this code.
Step 3: Run this code
Open the terminal, Go to ns-3.29 and run the following command

$] ./waf --run scratch/manet-routing-compare

enable the following header file

#include "ns3/flo…

Blackhole attack in ns2 - NS2 Tutorial # 12

How to add a black hole attack in AODV protocol in ns2.

https://www.nsnam.com 

Black hole is the basic attack in a network, here we are going mitigate this attack in ns2.

Trust value, based on the trust value, if the value is less, then we can make it as an attacker node.

High trust, medium trust and low trust (integer)

Trusted or not (boolean)

To make a node attacker node (preferanly a black hole attack, how to do that?)

AODV protocol as it is easy to implement in ns2.


Step 1: Declare the attacker variable
We will two files aodv.h and aodv.cc files 
in aodv.h file, 
create a variable name as given below in the protected scope

bool attacker;

Step 2: initialise the attacker variable as false.
In aodv.cc file, initialise the attacker to be false inside the constructor.


Step 3: if a node is a blackhole, what happens to attacker value
in the command() function of aodv.cc file inside the block 
if(argc==2), include the following lines

if(strncasecmp(argv[1], "blackhole") == 0) {
attacker=true;
      return TCL_OK;
    }

Step 4: If the node is an attacker node, what it will do?
if(attacker==true)
{
printf("Packets dropped by node number %d is %d \n",index,t_count++);
drop(p,DROP_RTR_ROUTE_LOOP);
}


Open the terminal and go to ~ns-2.35/ and execute the command 

$] make 

If no errors, in the above logic your compilation is successful.

Step 5: Run the TCL file with AODV protocol, with Attacker code and without attacker code and compare both the results.

$] ns AODV.tcl

You can compare the node with attacker and without attacker
Here is the comparison for an attacker node (node number 5)

When node 5 was an Attacker node, these are the results
Number of generated packets: 4
Number of sent packets: 2
Number of forwarded packets: 2
Number of received packets: 22
Number of dropped packets: 16
Number of lost packets: 0
Number of sent bytes: 204
Number of forwarded bytes: 88
Number of received bytes: 1000
Number of dropped bytes: 472
Minimal packet size: 40
Maximal packet size: 102
Average packet size: 49.6923

When node 5 was a good node, here is the result

Number of generated packets: 446
Number of sent packets: 446
Number of forwarded packets: 443
Number of received packets: 465
Number of dropped packets: 0
Number of lost packets: 0
Number of sent bytes: 373736
Number of forwarded bytes: 347724
Number of received bytes: 348764
Number of dropped bytes: 0
Minimal packet size: 32
Maximal packet size: 1598
Average packet size: 790.4165

You can watch for my forthcoming video (preferably tomorrow) on Tracegraph. Which is used in this tutorial.

Thanks for watching...
Subscribe to my channel and share it to your friends 

Spread the knowledge..

Youtube.com/tspradeepkumar
https://www.nsnam.com 

Stay Tuned...


T S Pradeep Kumar

Comments

  1. I did see the source code for blackhole attack??? where is it Please????

    ReplyDelete
    Replies

    1. https://drive.google.com/open?id=1LFRrmJM3YXiQT3X1HMSFyS9T9d8oWlIx

      Delete
  2. Hello sir, Thank you so much for this video.
    can i download the source codes please?
    if yes , Then how?
    please sir give the download the source codes link

    ReplyDelete
  3. I am facing difficulties trying to download the codes. any help??

    ReplyDelete
  4. Please help me
    ns: _o40 blackhole:
    (_o40 cmd line 1)
    invoked from within
    "_o40 cmd blackhole"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]

    ReplyDelete
  5. ns: _o40 blackhole :
    (_o40 cmd line 1)
    invoked from within
    "_o40 cmd blackhole"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]
    global errorInfo
    set savedInfo $errorInfo
    error "error when calling class $cls: $args" $..."
    (procedure "_o40" line 2)
    (SplitObject unknown line 2)
    invoked from within
    "_o40 blackhole "
    i am getting this error while implementing black hole attack kidnly help me

    ReplyDelete
  6. Respected sir i've followed the above procedure but getting this error.
    Kindly help me out of this error, I shall be very thankful to you.
    saifullah@saifullah-Inspiron-3542:~$ ns AODV.tcl
    num_nodes is set 17
    INITIALIZE THE LIST xListHead
    ns: _o63 blackhole:
    (_o63 cmd line 1)
    invoked from within
    "_o63 cmd blackhole"
    invoked from within
    "catch "$self cmd $args" ret"
    invoked from within
    "if [catch "$self cmd $args" ret] {
    set cls [$self info class]
    global errorInfo
    set savedInfo $errorInfo
    error "error when calling class $cls: $args" $..."
    (procedure "_o63" line 2)
    (SplitObject unknown line 2)
    invoked from within
    "_o63 blackhole"

    ReplyDelete
  7. Sir, respectfully, I hope you could at least reply comments because some of us actually followed the exact same thing as you did, but the output wasn't the same.

    ReplyDelete

Post a Comment

Popular posts from this blog

Routing in VANETs using ns3

Part 1
WAVE - Wireless Access for Vehicular environments. vanet-routing-compare.cc It might take more than an hour. The readers are requested to be patient. SUMO, VANETs, routing comparison 1. Explain the full source code (1550 lines of code) 2. Creating a real scenario using osm (Open Street Map Web Wizard) 3. Performance analysis for various vanet protocols. https://www.nsnam.com Location of the source code /home/pradeepkumar/ns-allinone-3.27/ns-3.27/src/wave/examples
Move this file to the scratch/ for inclusion of all modules. Step 1: Explanation of source code. Copy the file to scratch folder. This is just Part 1 of the VANET comparison

Part 2 Please watch the First Part before watching this video   https://www.youtube.com/watch?v=IJYeIpUqjQI&t=850s
Part 2 - Analysis of the results.
Please go through the first video (Part 1) and then watch this video (PArt 2)
#VANETs #NS3 #Routing
1. SUMO for web traffic (osmWebWizard.py) 2. Convert this into mobility.tcl file and t…

ns3 installation in Ubuntu 16.04

This post serves the installation instructions of ns3 in ubuntu 16.04 version. Some of my students are working in ns3, this post will benefit them in installing ns3.

OS Used: Ubuntu 16.04.4
ns3 version: ns3 version 3.27

The same procedure will be applied for OS like Debian, Linux Mint.

Fresh installation of Ubuntu 16.04 Let you try the fresh installation of ubuntu in your hard disk along with windows.
Installation of ns3 dependencies ns3 needs so many dependencies, developmental libraries, drivers, etc. so install all those
$] sudo apt update  $] sudo apt upgrade
$] sudo apt-get install build-essential autoconf automake libxmu-dev python-pygoocanvas python-pygraphviz cvs mercurial bzr git cmake p7zip-full python-matplotlib python-tk python-dev python-kiwi python-gnome2 python-gnome2-desktop-dev python-rsvg qt4-dev-tools qt4-qmake qt4-qmake qt4-default gnuplot-x11 wireshark
The above command make take some time to download, compile and install it, Be Patient. 
Installing ns3 Download the…

TORA Protocol in NS-2.35 (NS2)

This post tells you how to enable the TORA (Temporally ordered routing Algorithm) protocol in Network Simulator 2 (ns-2.35)

TORA is a protocol in wireless adhoc networks that works with timing parameters. NS-2.35 comes with the TORA protocol by default but it has to be tweaked manually to make it run.
This post will help you to do that.

You can watch this video for detailed instructions:


Step 1: Generate a Scenario for TORA protoco using NS2 Scenario Generator NSG Software.
We have created a tcl file using NSG2.1.jar

$] java -jar NSG2.1.jar

Three files have to be modified
~ns-2.35/tora/tora.cc~ns-2.35/tora/tora.h~ns-2.35/imep/imep.cc There are various websites that tells you how to configure TORA by making changes to the above three files.  Change 1: tora.h In the tora.h file, go to the end of the File before the agent completes, include these two lines

#include <classifier/classifier-port.h>
protected: PortClassifier *dmux_;

Change 2: tora.cc Open the tora.cc and include the follow…