Research Article
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
Begin | Foreach (received request) Do | If (source_ID of the request in Request_Counter table) Then | Increment request_counter of that node; | End if | Else Add a new entry for the source of the request to | Request_Counter table; | End else | If (source_ID of the request in the suspicious list) Then | limit = limit/2; | End if | If (request counter > limit) Then | Add source ID to the suspicious list; | Drop request; | End if | Else Process request; | End else | End for | End |
|