Figure 1: An example of flooding attack. Alice is the source who attempts to send encoded packets to the destination, Bob. Bob is supposed to forward an ACK to Alice once he successfully decodes a message. The adversary, Charlie, drops or delays the ACK: Alice never stops to transmit packets to Bob.