Performance Analysis of Security Attacks on WSN

Performance Analysis of Security Attacks on WSN

Performance Analysis of Security Attacks on WSN

Implementation plan:
—————————

Scenario :1 (with 25 Mobile Nodes)
—————————————–

Step 1: Initially, we construct Wireless Sensor Networks with 25 number of Mobile nodes , 2 base stations and 1 server

Step 2: Then, we configure routing using MAC with RPL and CSMA/CA protocol.

Step 3: Next, we simulate the network to view the communication between the nodes.

Step 4: Next, we implement the Blackhole attack by dropping packets, the Wormhole attack by tunneling packets between malicious nodes, and the Packet Collision attack by injecting packets to cause collisions, black-off, flooding and jamming for static and mobile topologies.

Step 5: Next, we mitigate the malicious nodes behaviors by checking packet flow patterns to drop all incoming packets .

Step 6: Finally, we plot performance metrics for the following

6.1: Number of Mobile Nodes Vs. Packet Delivery Ratio (%)

6.2: Number of Mobile Nodes Vs. End-to-End Delay (ms)

6.3: Number of Mobile Nodes Vs. Energy Consumption (J)

6.4: Number of Mobile Nodes Vs. Routing Overhead (%)

6.5: Number of Mobile Nodes Vs. Network Lifetime (ms)

Scenario :2 (with 50 Mobile Nodes)
—————————————–

Step 1: Initially, we construct Wireless Sensor Networks with 50 number of Mobile nodes , 2 base stations and 1 server

Step 2: Then, we configure routing using MAC with RPL and TSCH protocol .

Step 3: Next, we simulate the network to view the communication between the nodes.

Step 4: Next, we implement the Blackhole attack by dropping packets, the Wormhole attack by tunneling packets between malicious nodes, and the Packet Collision attack by injecting packets to cause collisions, black-off, flooding and jamming for static and mobile topologies.

Step 5: Next, we mitigate the malicious nodes behaviors by checking packet flow patterns to drop all incoming packets .

Step 6: Finally, we plot performance metrics for the following

6.1: Number of Mobile Nodes Vs. Packet Delivery Ratio (%)

6.2: Number of Mobile Nodes Vs. End-to-End Delay (ms)

6.3: Number of Mobile Nodes Vs. Energy Consumption (J)

6.4: Number of Mobile Nodes Vs. Routing Overhead(%)

6.5: Number of Mobile Nodes Vs. Network Lifetime (ms)

 

Scenario :3(with 100 Mobile Nodes):
——————————————

Step 1: Initially, we construct Wireless Sensor Networks with 100 number of Mobile nodes , 2 base stations and 1 server

Step 2: Then, we configure routing using MAC with RPL and LoRAWAN protocol .

Step 3: Next, we simulate the network to view the communication between the nodes.

Step 4: Next, we implement the Blackhole attack by dropping packets, the Wormhole attack by tunneling packets between malicious nodes, and the Packet Collision attack by injecting packets to cause collisions, black-off, flooding and jamming for static and mobile topologies.

Step 5: Next, we mitigate the malicious nodes behaviors by checking packet flow patterns to drop all incoming packets .

Step 6: Finally, we plot performance metrics for the following

6.1: Number of Mobile Nodes Vs. Packet Delivery Ratio (%)

6.2: Number of Mobile Nodes Vs. End-to-End Delay (ms)

6.3: Number of Mobile Nodes Vs. Energy Consumption (J)

6.4: Number of Mobile Nodes Vs. Routing Overhead(%)

6.5: Number of Mobile Nodes Vs. Network Lifetime (ms)

Software requirement:
—————————

1. Development Tool: OMNET++ 6.0 or above with INET

2. Operating System: Windows 10 (64-bit) or Above

Note:
——

1) If the plan does not meet your requirements, provide detailed steps, parameters, models, or expected results in advance. Once implemented, changes won’t be possible without prior input; otherwise, we’ll proceed as per our implementation plan.

2) If the plan satisfies your requirement, Please confirm with us.

3) Project based on Simulation only, not a real time project.

4) If you have any changes in the Dataset , kindly provide before implementation.

5) Please understand that any modifications made to the confirmed implementation plan will not be made after the project development.

Live Tasks
Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Workflow

YouTube Channel

Unlimited Network Simulation Results available here.

Related Topics