Hi Every one,

I just tried to look my doubt in FAQs, and didn't find one that matches.

I am Just working on a simulation analysis of rreq flooding attack in
reactive protocols especially in AODV routing protocol.

I need to change the AODV code to implement the flooding attack so that one
of the nodes will be malicious. I am not sure how to reflect this effect on
TCL codes either.

Can any one suggest me on how to proceed or tell the things i need to
change for the attack to work?

Thanks in advance
Tek

Reply via email to