|Applicable Versions||NetSim Standard||NetSim Pro|
The Sinkhole attack that is implemented as part of IDS uses one of the features of DSR protocol as a loophole. That is, in DSR when the source node broadcasts DSR Route Request packet(RREQ), even intermediate nodes can send a Route Reply(RREP), if they have a route to the destination node in their route cache. The malicious node adds a fake route entry into its route cache and sends an RREP.
If TCP is enabled, the source node will accept only the packets that come from the respective destination node. Any packet from the intermediate device will be discarded. Due to this, it will not be possible to simulate a sinkhole attack.
This is the reason why we disable TCP in the transport layer of each node.
Refer link for IDS in MANET :
For Netsim v13.0: Intrusion detection system_MANETs_v13.0.pdf (tetcos.com)
For Netsim v12: Intrusion-detection-system-for-MANET_v12.1.pdf (tetcos.com)