LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 12-30-2018, 01:25 PM   #1
Learner000
LQ Newbie
 
Registered: Dec 2018
Posts: 1

Rep: Reputation: Disabled
Wink Having difficulty in implementing wormhole detection or prevention technique!


Hello,

I have implemented wormhole attack in aodv routing protocol in NS2.35. Now, i want to implement some methods like DELPHI, trust based model or MHA to detect or prevent the wormhole attack. I have understood the working principal of those detection models but having difficulty on implementing them. If someone can shade some lights on it or some links or source code would be really helpful. Thanks
 
Old 01-02-2019, 02:10 PM   #2
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,636

Rep: Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965
Quote:
Originally Posted by Learner000 View Post
Hello,

I have implemented wormhole attack in aodv routing protocol in NS2.35. Now, i want to implement some methods like DELPHI, trust based model or MHA to detect or prevent the wormhole attack. I have understood the working principal of those detection models but having difficulty on implementing them. If someone can shade some lights on it or some links or source code would be really helpful. Thanks
Happy to help you; have you read the "Question Guidelines" link in my posting signature, and the LQ Rules?? We will help you with your homework, but you have to show us what efforts YOU have made first.

So, since you say you've implemented these things, and want to do more, post the code that YOU have written, and tell us where you're stuck. We can't tell you how to overcome a 'difficulty', when you don't tell us what problem(s) you're actually having. And we aren't going to look up links for you, either...you can easily search for code/examples on your own.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Detection and Prevention of Wormhole Attack in ns2 m0_nono Linux - Newbie 3 08-16-2016 10:59 AM
Detection and Prevention of Blackhole Attack, Wormhole Attack in MANET Using ACO in ns2 neda_71 Linux - Software 5 08-13-2016 02:43 PM
Detection and Prevention of Blackhole Attack, Wormhole Attack in MANET Using ACO in ns2 neda_71 Linux - Virtualization and Cloud 1 07-30-2016 06:15 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 08:33 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration