Attack Patterns for Black Hole, Gray Hole and Worm Hole Attack on Adhoc Networks
Attacks by malicious nodes on authentic communicating nodes in an ad hoc network scenario are sometimes severe. Based upon the types of attacks, throughput of the network suffers in different ways. Finding out the attack patterns or the signature from the observed throughputs over times is necessary for protection of data flows in the network. In this paper, to find out the attack patterns, the authors implement black hole, gray hole and worm hole attacks on the wireless ad-hoc network nodes. They study the effects of these attacks on the throughput of the networks at different data rates. They simulate for 1, 2, 3 and 4 malicious nodes of each attack types at different data rates.