Description: Using ns2 simulation, DSR protocol to achieve a black hole attack, divided into specific: active and passive attacks.
To Search:
File list (Check if you may need any files):
dsr
...\add_sr.cc
...\cache_stats.h
...\constants.h
...\dsragent.cc
...\dsragent.cc_bak
...\dsragent.cc~
...\dsragent.h
...\dsragent.h_bak
...\dsragent.h~
...\dsr_proto.cc
...\dsr_proto.h
...\flowstruct.cc
...\flowstruct.h
...\hdr_sr.cc
...\hdr_sr.h
...\linkcache.cc
...\mobicache.cc
...\path.cc
...\path.cc~
...\path.h
...\path.h~
...\requesttable.cc
...\requesttable.h
...\routecache.cc
...\routecache.h
...\simplecache.cc
...\srpacket.h
...\sr_forwarder.cc
...\sr_forwarder.h