Hello all,
I am currently analyzing the effect of RREQ flooding attack in AODV. I used
the scripts (setdest and cbrgen.tcl) to generate the mobility and traffic
files randomly.
But I want none of the malicious nodes should participate in the
source-destination pair.
Is there any way (other
Dear ns-users,
I am working on ns-2 simulation of AODV protocol. I just want to use the
neighbor table to add some information. But the lookup function always
returns FALSE in my case when i want to print the neighbors for a given
node. I can see that there are neighbors from the trace file that
Dear ns-users,
I am working on ns-2 simulation of AODV protocol. I just want to use the
neighbor table to add some information. But the lookup function always
returns FALSE in my case when i want to print the neighbors for a given
node. I can see that there are neighbors from the trace file that
Dear All,
I just tried to modify the C++ code of AODV such that one node tries
to flood rreq to a destination that doesn't exist based on some
information I got on the web. let me explain what I did.
I added a class FloodTimer to aodv.h as follows.
class FloodTimer : public Handler {
public:
Hi Every one,
I just tried to look my doubt in FAQs, and didn't find one that matches.
I am Just working on a simulation analysis of rreq flooding attack in
reactive protocols especially in AODV routing protocol.
I need to change the AODV code to implement the flooding attack so that one
of