arlotfi79 / RPL-Rank-Attacks

Implementation of a number of rank attacks on RPL using Cooja simulator
MIT License
0 stars 0 forks source link

What is the sequence i should follow to build a correct simulation scenario? #1

Open Laileet opened 1 year ago

Laileet commented 1 year ago

Hello Sir, I have been trying to contact you on your provided email since Sat, 17 Dec 2022, I wasn't lucky to get any response though. I tried thoroughly to figure out the requested configurations of the attached files and how to run simulations using your helpful guidance. I wanted to know, after I include normal motes, in order to include the attacker node I have to make modifications to the core files, these files are used by the normal motes as well during the simulation, would modifications affect the normal motes' behavior? I searched a lot but no answer! Will you please inform me or provide some guidance on how to sequence the steps to run a successful simulation scenario?

arlotfi79 commented 1 year ago

Hi @Laileet , Sorry for the delay in my response.

To give you an overall instruction on what to do:

  1. First, Compile your normal motes using the tools available in Cooja
  2. Then, modify the part of the source code that you need to perform the attack. It will be easier for you to save the modifications in a file with a different name so that you can see the attacker node in a different color in the Cooja simulation.
  3. After these steps, you can add the motes (in my simulation .sky file) and run the simulation.

About your question ("would modifications affect the normal motes' behavior?"), it seemed that it will affect the normal motes if you do not change the name of the modified file. Thus, if you follow the instruction provided above, it should work fine.

Laileet commented 1 year ago

Dear Mr. Alireza, Hope this finds you well. Ramadan Mubarak. I've been trying very hard to make the code run but apparently, something i'm doing is wrong, I will be grateful if you would point at it:

  1. The files you're requesting to modify are the core files of contiki 3.0 so i copied that file and named each one after the name of RA scenario such as DR-Contiki3.0.
  2. Then, I modified the timers.h and private.h within the new folder DR-Contiki3.0
  3. Then, i placed the DR-sendernode.c into the collect view experiment.
  4. Afterward, i created an experiement with normal nodes and sink from original Contiki3.0 folder and an attacker node from DR-Contiki3.0 folder created with modifications.

Still, Normal scenario and with attack gave same results! Please point out my mistake.

Regards, Layla


From: Alireza Lotfi @.> Sent: Tuesday, February 21, 2023 3:40 PM To: arlotfi79/RPL-Rank-Attacks @.> Cc: LAYLA MOHAMMAD MAH'D ALQAISI @.>; Author @.> Subject: Re: [arlotfi79/RPL-Rank-Attacks] What is the sequence i should follow to build a correct simulation scenario? (Issue #1)

Hi Laileet, Sorry for the delay in my response.

To give you an overall instruction on what to do:

  1. First, Compile your normal motes using the tools available in Cooja
  2. Then, modify the part of the source code that you need to perform the attack. It will be easier for you to save the modifications in a file with a different name so that you can see the attacker node in a different color in the Cooja simulation.
  3. After these steps, you can add the motes (in my simulation .sky file) and run the simulation.

About your question ("would modifications affect the normal motes' behavior?"), it seemed that it will affect the normal motes if you do not change the name of the modified file. Thus, if you follow the instruction provided above, it should work fine.

— Reply to this email directly, view it on GitHubhttps://github.com/arlotfi79/RPL-Rank-Attacks/issues/1#issuecomment-1438413808, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AVQDA6RIFQDUBOBRI7QRV6TWYSZTRANCNFSM6AAAAAAUCTEAKM. You are receiving this because you authored the thread.Message ID: @.***>