Hi Every one, I just tried to look my doubt in FAQs, and didn't find one that matches.
I am Just working on a simulation analysis of rreq flooding attack in reactive protocols especially in AODV routing protocol. I need to change the AODV code to implement the flooding attack so that one of the nodes will be malicious. I am not sure how to reflect this effect on TCL codes either. Can any one suggest me on how to proceed or tell the things i need to change for the attack to work? Thanks in advance Tek