Hello all,

I am currently analyzing the effect of RREQ flooding attack in AODV. I used
the scripts (setdest and cbrgen.tcl) to generate the mobility and traffic
files randomly.
But  I want none of the  malicious nodes should  participate in the
source-destination pair.

Is there any way (other than identifying manually which nodes would be
malicious and which nodes should src and dst) that i can make sure that the
nodes to be malicious are not part of the active connections during the
simulation?

regards,
Tek

Reply via email to