Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
75 views1 page

Figure 5.1 Flow Chart

The flow chart shows the process of route discovery in a network. It begins with initiating route discovery by broadcasting route requests (RREQs). If a route is established, the source waits for a route reply (RREP). Otherwise, it calls a key detection procedure to check if the next node is authentic based on its key and trust values. If not authentic, the malicious node is detected, blocked, and isolated from the route.

Uploaded by

Ankit Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views1 page

Figure 5.1 Flow Chart

The flow chart shows the process of route discovery in a network. It begins with initiating route discovery by broadcasting route requests (RREQs). If a route is established, the source waits for a route reply (RREP). Otherwise, it calls a key detection procedure to check if the next node is authentic based on its key and trust values. If not authentic, the malicious node is detected, blocked, and isolated from the route.

Uploaded by

Ankit Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

FLOW CHART

Start
Initiate route discovery

Step-I RREQs (route request)

If route
Step-III Call LREPAIR
Else
Established
Wait for RREPElse Node
If route decrements
Step-II Call key DETECT repaired in TTL the key value

Source check route table entry

Route established and waits for RREP


If node
Node is authentic
1.key_val >assn_key_val

2.trust_val <assn_trust_val
ELSE
Send data packet

Detect malicious node and block M node

End
END
Step-IV call TRUSTISOLATE

Source send ICMP message to neighbor node


RREQ: Route Request

RREP: Route Reply


Delete M node entry from route
INTRUISOLATE: Intrusion isolation
Recall step-I SEQ-NO.: Sequence number

Figure 5.1 Flow chart

You might also like