Research Article
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
Begin | Foreach (received request) Do | If (source_ID of the request and destination not in | Request_Destination_ID table) Then | Add a new entry for the source of the request and | destination to Request_Destination_ID table; | End if | If (source_ID of the request in the Black list) Then | Drop request; | End if | If (ID_request_count > ID_limit) Then | If (source_ID in the suspicious list) Then | Add source ID to the Black list; | Drop request; | End if | Else Add source ID to the suspicious list; | Drop request; | End else | End if | End for | End |
|