I am Shah. I am working on a simulation for localization using Hello Flood attack in Matlab which i have completed. But now in a very short time i need matlab code for WORMHOLE ATTACK. Although code for wormhole attack is available in ns2 and c++ but prevously i am working on Matlab so i cannot switch the software to check the localizaton behavior of wormhole attack.
So if anyone can provide me Matlab code for wormhole attack or guide me how to convert ns2 codse into matlab.
As mobile ad hoc network applications are implemented and security emerges as a central requirement. In this article, we present the wormhole attack, a severe attack on ad hoc networks that is particularly challenging to defend itself. Attack of the wormhole is possible even if the attacker has not compromised any host, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker logs packets (or bits) into a network location, uploads them (possibly selectively) to another location and relays them to the network. Wormhole attack can be a serious threat to wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, could not find routes longer than one or two jumps, severely interrupting communication. We introduce a general mechanism, called packet leashes, to detect and, therefore, defend against wormhole attacks, and present a specific protocol, called TIK, which implements straps. We also discuss topology-based worm detection, and demonstrate that it is impossible for these approaches to detect some topolagies of worms.