Research Article
A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks
Algorithm 2
Pseudocode of A-LA routing.
At Source node, | Choose the destination node using Ant routing | Perform the authentication mechanism with the node encountered | Encrypt the data pkt using AES algorithm and broadcast it | Initialize a timer value for rebroadcasting the data pkt | At Destination node, | Decipher the received pkt by AES decryption mechanism | If pkt is received for the first time | Deliver the pkt | Transmit ack pkt | At Relay nodes, | Check whether sender is trusted node | //done by means of agent test parameters | Update information at encountered node | //done by means of gossiping technique |
|