Hello all, I am currently analyzing the effect of RREQ flooding attack in AODV. I used the scripts (setdest and cbrgen.tcl) to generate the mobility and traffic files randomly. But I want none of the malicious nodes should participate in the source-destination pair.
Is there any way (other than identifying manually which nodes would be malicious and which nodes should src and dst) that i can make sure that the nodes to be malicious are not part of the active connections during the simulation? regards, Tek