This work is for the development environment of ns-2.35 on the Mac OS. It also contains some basic works for the malicious study in Ad hoc network simulation. (eg. blackhole-aodv, grayhole-aodv, watchdog(aodv), and Bayesian-watchdog(aodv))
- Host OS: macOS High Sierra version 10.13.4 (may have issue in other OS)
- Docker base image is ubuntu:14:04
- Docker files are based on docker-ns2
- Docker develop environment ns2.35-with-docker can be found in docker hub
- Miniconda3 ( python3.6 and pip3.6 ) is installed along with jupyter notebook.
This project includes:
- How to simulation and project description in Readthedocs
- Already being installed source code of ns2.35
- New protocols including mflood, blackhole-aodv, grayhole-aodv, watchdog(aodv), and Bayesian-watchdog(aodv)
- Simulation analyze tools: NSG2.1, APP-tool, py-parser, jupyter notebook
NSG2.1 is developed in Java to make the generation of tcl files easy with GUI
APP Tool (Automated Post Processing tool) is a ns2 tracefile analyser with GUI
Nam is a Tcl/TK-based animation tool for viewing network simulation traces and real-world packet traces.
Access to http://localhost:8888 with login password: "jupyter" (or set the password by yourself)
ns2 tools for simulation preparation and results parser
To display the GUI (nam / NSG / APP Tool) from docker to macOS you should:
- Confirm X11 is already installed
- Run
xhost + 127.0.0.1
in the host Mac OS in advance.
@INPROCEEDINGS{6174693,
author={Yang, Bo and Yamamoto, Ryo and Tanaka, Yoshiaki},
booktitle={2012 14th International Conference on Advanced Communication Technology (ICACT)},
title={Historical evidence-based trust management strategy against black hole attacks in MANET},
year={2012},
volume={},
number={},
pages={394-399},
doi={}}
}
@INPROCEEDINGS{6779177,
author={Yang, Bo and Yamamoto, Ryo and Tanaka, Yoshiaki},
booktitle={16th International Conference on Advanced Communication Technology},
title={Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs},
year={2014},
volume={},
number={},
pages={223-232},
doi={10.1109/ICACT.2014.6779177}}