Research Article
Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique
Source Node | 1Broadcast request to the Destination node as native AODV; | 2for each received Reply to the Destination node request do | 3if NWSP in the Black-hole list then | 4Discard reply; | 5end if | 6if NWSP not in neighbor list && Not from Destination node then | 7Discard reply; | 8else | 9Continue as native AODV and start transmitting packets to the Destination node; | 10end if | 11end for |
|