Research Article

Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)

Algorithm 2

Attacker isolation.
Begin
Foreach (received request) Do
If (source_ID of the request and destination not in
   Request_Destination_ID table) Then
 Add a new entry for the source of the request and
 destination to Request_Destination_ID table;
 End if
If (source_ID of the request in the Black list) Then
  Drop request;
End if
If (ID_request_count > ID_limit) Then
  If (source_ID in the suspicious list) Then
    Add source ID to the Black list;
    Drop request;
  End if
  Else Add source ID to the suspicious list;
    Drop request;
  End else
 End if
End for
End