You are on page 1of 1

FLOW CHART

Start
Initiate route discovery

Step-I RREQs (route request)

If route
Step-III Call LREPAIR
Else
Established
Wait for RREPElse Node
If route decrements
Step-II Call key DETECT repaired in TTL the key value

Source check route table entry

Route established and waits for RREP


If node
Node is authentic
1.key_val >assn_key_val

2.trust_val <assn_trust_val
ELSE
Send data packet

Detect malicious node and block M node

End
END
Step-IV call TRUSTISOLATE

Source send ICMP message to neighbor node


RREQ: Route Request

RREP: Route Reply


Delete M node entry from route
INTRUISOLATE: Intrusion isolation
Recall step-I SEQ-NO.: Sequence number

Figure 5.1 Flow chart

You might also like