Preview

Nt1330 Unit 7 Exercise 1

Good Essays
Open Document
Open Document
489 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 7 Exercise 1
The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then …show more content…
The neighbor nodes forward the Route Request (RREQ) to the destination node. If Rushing attacks send duplicate Route Request (RREQ) to the neighbor node. If Request RREQ is from the true source address, then the system is regular and begins to transmit data packets otherwise repeat the process. This process is illustrated in Fig 1.

Check threshold value: Next check the packet delivery ratio, if packet delivery ratio drops to threshold then move to next step. The threshold value is calculated using dynamic threshold algorithm indicated in [3]. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source nodes select one-hop neighbor node nr as the destination and send the RREQ to that node as shown in Fig 2. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also Reply RREP. It indicates that there is Attacker in Reply

You May Also Find These Documents Helpful