ABSTRACT

The black hole attack represents one of the security issues, which threaten delay-tolerant networks (DTNs) and degrades their performance. This chapter analyses a black hole attack in the opportunistic network environment (ONE) simulator, where the existing simulator lacks security issues. It describes the related work on DTNs, DTN routing protocols, DTN routing attack, and DTN security. The chapter explains design and implementation of black hole behavior by the extending ONE simulator, where the proposed work and the extended simulator are explained. It focuses on the technical tools and the methodology that have been used in the research. The ONE simulator lacks the representation of black hole behavior; therefore, a new black hole epidemic routing module has been implemented in order to provide behavior of the malicious nodes. A simulation scenario is constructed by defining node groups and their properties.