Wormhole Attack Detection Methods in Mobile Ad Hoc Networks
Paper instructions
NS2 Simulation Process
And the steps should work on it 1- build the protocols 2- agent code 3- tcl script ( scenario generation ) 4- finalized trace files 5- proposal protocol 6 – build and run simulation and report analysis