Performance Analysis of Security Attacks on WSN
Implementation plan:
—————————
Scenario :1 (with 25 Mobile Nodes)
—————————————–
Step 1: Initially, we construct Wireless Sensor Networks with 25 number of Mobile nodes , 2 base stations and 1 server
Step 2: Then, we configure routing using MAC with RPL and CSMA/CA protocol.
Step 3: Next, we simulate the network to view the communication between the nodes.
Step 4: Next, we implement the Blackhole attack by dropping packets, the Wormhole attack by tunneling packets between malicious nodes, and the Packet Collision attack by injecting packets to cause collisions, black-off, flooding and jamming for static and mobile topologies.
Step 5: Next, we mitigate the malicious nodes behaviors by checking packet flow patterns to drop all incoming packets .
Step 6: Finally, we plot performance metrics for the following
6.1: Number of Mobile Nodes Vs. Packet Delivery Ratio (%)
6.2: Number of Mobile Nodes Vs. End-to-End Delay (ms)
6.3: Number of Mobile Nodes Vs. Energy Consumption (J)
6.4: Number of Mobile Nodes Vs. Routing Overhead (%)
6.5: Number of Mobile Nodes Vs. Network Lifetime (ms)
Scenario :2 (with 50 Mobile Nodes)
—————————————–
Step 1: Initially, we construct Wireless Sensor Networks with 50 number of Mobile nodes , 2 base stations and 1 server
Step 2: Then, we configure routing using MAC with RPL and TSCH protocol .
Step 3: Next, we simulate the network to view the communication between the nodes.
Step 4: Next, we implement the Blackhole attack by dropping packets, the Wormhole attack by tunneling packets between malicious nodes, and the Packet Collision attack by injecting packets to cause collisions, black-off, flooding and jamming for static and mobile topologies.
Step 5: Next, we mitigate the malicious nodes behaviors by checking packet flow patterns to drop all incoming packets .
Step 6: Finally, we plot performance metrics for the following
6.1: Number of Mobile Nodes Vs. Packet Delivery Ratio (%)
6.2: Number of Mobile Nodes Vs. End-to-End Delay (ms)
6.3: Number of Mobile Nodes Vs. Energy Consumption (J)
6.4: Number of Mobile Nodes Vs. Routing Overhead(%)
6.5: Number of Mobile Nodes Vs. Network Lifetime (ms)
Scenario :3(with 100 Mobile Nodes):
——————————————
Step 1: Initially, we construct Wireless Sensor Networks with 100 number of Mobile nodes , 2 base stations and 1 server
Step 2: Then, we configure routing using MAC with RPL and LoRAWAN protocol .
Step 3: Next, we simulate the network to view the communication between the nodes.
Step 4: Next, we implement the Blackhole attack by dropping packets, the Wormhole attack by tunneling packets between malicious nodes, and the Packet Collision attack by injecting packets to cause collisions, black-off, flooding and jamming for static and mobile topologies.
Step 5: Next, we mitigate the malicious nodes behaviors by checking packet flow patterns to drop all incoming packets .
Step 6: Finally, we plot performance metrics for the following
6.1: Number of Mobile Nodes Vs. Packet Delivery Ratio (%)
6.2: Number of Mobile Nodes Vs. End-to-End Delay (ms)
6.3: Number of Mobile Nodes Vs. Energy Consumption (J)
6.4: Number of Mobile Nodes Vs. Routing Overhead(%)
6.5: Number of Mobile Nodes Vs. Network Lifetime (ms)
Software requirement:
—————————
1. Development Tool: OMNET++ 6.0 or above with INET
2. Operating System: Windows 10 (64-bit) or Above
Note:
——
1) If the plan does not meet your requirements, provide detailed steps, parameters, models, or expected results in advance. Once implemented, changes won’t be possible without prior input; otherwise, we’ll proceed as per our implementation plan.
2) If the plan satisfies your requirement, Please confirm with us.
3) Project based on Simulation only, not a real time project.
4) If you have any changes in the Dataset , kindly provide before implementation.
5) Please understand that any modifications made to the confirmed implementation plan will not be made after the project development.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |