FLOW CHART
Start
Initiate route discovery
Step-I RREQs (route request)
If route
Step-III Call LREPAIR
Else
Established
Wait for RREPElse Node
If route decrements
Step-II Call key DETECT repaired in TTL the key value
Source check route table entry
Route established and waits for RREP
If node
Node is authentic
1.key_val >assn_key_val
2.trust_val <assn_trust_val
ELSE
Send data packet
Detect malicious node and block M node
End
END
Step-IV call TRUSTISOLATE
Source send ICMP message to neighbor node
RREQ: Route Request
RREP: Route Reply
Delete M node entry from route
INTRUISOLATE: Intrusion isolation
Recall step-I SEQ-NO.: Sequence number
Figure 5.1 Flow chart