Open azeemjahangir opened 3 years ago
Hi @azeemjahangir
TLDR ; this source code is made at runtime while compiling a simulation. It can either be retrieved during this operation or regenerated by reproducing the operations from the building-blocks manually.
While making a campaign of simulations (e.g. the demo campaign) or a single simulation, the ContikiRPL library is modified based on the selected building-blocks (using the available operations, e.g. pattern replacement). The malicious mote is then compiled from its C file, therefore using the modified ContikiRPL library and afterwards immediately removed. So, if you want to get the modified code, you can simply manually reproduce the modifying operations from the building-blocks or interrupt the simulation while it is being made, before the process removes the temporary sources of the modified ContikiRPL library.
Can any have decrease rank and blackhole in file so i can have an idea for implementation
Please read the documentation about building blocks. This will help you understand what you are searching for.
Here are the transformations (from the building blocks) for the decreased-rank building block :
{
"RPL_CONF_MIN_HOPRANKINC": 0,
"rpl-private.h": [
["#define RPL_MAX_RANKINC (7 * RPL_MIN_HOPRANKINC)", "#define RPL_MAX_RANKINC 0"],
["#define INFINITE_RANK 0xffff", "#define INFINITE_RANK 256"]
],
"rpl-timers.c": ["rpl_recalculate_ranks();", null]
}
This means :
RPL_CONF_MIN_HOPRANKINC
set in malicious mote's source file (malicious.c
, located in the with_malicious
and without_malicious
folders of the related experiment)contiki/core/net/rpl/rpl-private.h
contiki/core/net/rpl/rpl-timers.c
As it can be seen in the demo campaign, the blackhole attack is the combination of the decreased-rank building block (see above) and a drop-messages one that does not exist yet (you can propose a PR, if relevant :-) ).
This codes might be helpful for you. Blackhole-and D-Attacks.zip
Hi there, I realize I forgot to respond. My apologies... Thank you very much ! Indeed, it could be of help, but I don't spend time anymore on this project, at least for the time being as I'm too busy with other matters. Did you mind integrating it into the framework ?
This codes might be helpful for you. Blackhole-and D-Attacks.zip
Any read me file or instructions for this code?
sir can you help me to tell about how to implement attacker code in cooja 3.0
Just follow the instructions and you will have the attack files included
Layla Mohammad
From: researchrinki25 @.> Sent: Friday, March 1, 2024 11:34 AM To: dhondta/rpl-attacks @.> Cc: LAYLA MOHAMMAD MAH'D ALQAISI @.>; Comment @.> Subject: Re: [dhondta/rpl-attacks] Black hole and decrease rank attacks (#65)
sir can you help me to tell about how to implement attacker code in cooja 3.0
— Reply to this email directly, view it on GitHubhttps://github.com/dhondta/rpl-attacks/issues/65#issuecomment-1972745410, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AVQDA6SMZSTJHMIA6SD3W4LYWA4RHAVCNFSM474DKPZKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJXGI3TINJUGEYA. You are receiving this because you commented.Message ID: @.**@.>>
I need Black hole and version number of attacks code in c file