搜索资源列表
attack-1.5
- File for Misuse AODV 5
attack
- this file explains attacks on AODV
blackholeaodv
- blackhole aodv includes source code and tcl scr ipt for aodv and an IDS for fixing the attack
ADHOCnetworkblackhole
- ADHOC网络黑洞攻击仿真,黑洞攻击是一种典型的针对无线自组织(Ad Hoc)网络的攻击,也是Ad Hoc网络面临的主要安全威胁之一。为实现对黑洞攻击的仿真研究,基于黑洞攻击原理,在AODV路由协议的基础上,利用OPNET网络仿真平台,建立了Ad Hoc网络黑洞攻击仿真模型,搭建了不同攻击强度下的仿真场景。仿真结果表明:该模型能够较为准确地模拟各种环境下黑洞攻击对Ad Hoc网络性能的影响,可为Ad Hoc网络安全防范等问题的研究提供重要参考。 www.1-fun.com 推荐-Simul
Blackhole-attack
- 黑洞攻击的实现,基于AODV协议的,觉得有用可以下载-Realization of the black hole attack based on AODV protocol, find it useful can download and see
Sinkhole-in-AODV
- Sinkhole attack in AODV
blackholeaodv.tcl.tar
- simulating blackhole attack in aodv using ns-2
aodvattacker
- AODV attacker ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently im
aodv_attack
- 一个基于aodv协议的黑洞攻击的代码,不是很全,可以做个参考-A black hole attack based on AODV protocol code, is not very wide, can be a reference
LCM-MAC.tar
- implementation of wormhole attack in aodv
blackholeaodv
- this is aodv protocol under black_hole attack
aodv_blackhole-master
- aodv blackhole attack zip