I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
7
,
No
.
2
,
A
p
r
il
201
7
,
p
p
.
9
19
~
9
25
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v7
i
2
.
p
p
9
1
9
-
9
2
5
919
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
JE
C
E
Security Mea
sure
t
o
De
t
ect
and Av
o
id F
lo
o
ding
At
tack
s
u
sing
M
ulti
-
Ag
en
t
Sy
st
e
m
in
M
A
NET
S
B
a
nd
a
na
M
a
ha
pa
t
r
a
,
Srik
a
nta
P
a
t
na
ik
De
p
a
rte
m
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
En
g
in
e
e
rin
g
,
S
ik
sh
a
O
A
n
u
sa
n
d
h
a
n
Un
iv
e
rsity
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Dec
9
,
2
0
1
6
R
ev
i
s
ed
Mar
14
,
2
0
1
7
A
cc
ep
ted
Mar
30
,
2
0
1
7
S
e
c
u
rit
y
is
c
o
n
sid
e
re
d
a
s
o
n
e
o
f
th
e
m
a
jo
r
c
h
a
ll
e
n
g
e
w
h
e
n
it
c
o
m
e
s
to
in
f
ra
stru
c
tu
re
les
s
a
n
d
se
l
f
d
e
p
e
n
d
e
n
t
n
e
tw
o
rk
w
it
h
o
u
t
a
n
y
c
e
n
tralize
d
c
o
n
tro
l.
T
h
e
v
u
ln
e
ra
b
il
i
ty
o
f
A
d
h
o
c
Ne
tw
o
rk
m
a
k
e
s
it
su
sc
e
p
ti
b
le
to
e
x
tern
a
l
a
tt
a
c
k
s
li
k
e
f
lo
o
d
in
g
o
f
h
e
ll
o
m
e
s
sa
g
e
s
o
r
p
ro
p
a
g
a
ti
n
g
f
a
k
e
ro
u
ti
n
g
m
e
ss
a
g
e
s
e
tc.
S
u
c
h
a
tt
a
c
k
s
g
e
n
e
ra
tes
a
v
a
ri
e
t
y
o
f
p
ro
b
lem
s
li
k
e
d
istu
rb
i
n
g
th
e
n
e
t
w
o
rk
b
y
f
lo
o
d
i
n
g
m
e
ss
a
g
e
s
th
a
t
re
su
lt
s
in
w
a
ste
o
f
b
a
tt
e
r
y
w
h
ich
is
a
v
it
a
l
re
so
u
rc
e
to
m
a
in
tain
th
e
li
f
e
sp
a
n
o
f
th
e
n
e
tw
o
rk
.
M
o
st i
m
p
o
rtan
tl
y
c
a
u
se
a
g
e
n
ts
to
d
ie
w
h
e
n
u
n
a
b
le
t
o
re
a
c
h
d
e
stin
a
ti
o
n
d
u
e
to
f
a
k
e
ro
u
ti
n
g
m
e
ss
a
g
e
s
c
a
u
sin
g
a
h
e
a
v
y
lo
ss
o
n
p
a
rt
o
f
th
e
n
o
d
e
s
g
e
n
e
r
a
ti
n
g
th
e
m
to
m
a
in
tain
th
e
ro
u
te
k
n
o
w
led
g
e
.
T
h
e
p
a
p
e
r
p
ro
p
o
se
s
a
n
o
v
e
l
tec
h
n
iq
u
e
to
id
e
n
t
ify
th
e
f
lo
o
d
in
g
a
tt
a
c
k
a
n
d
m
e
a
su
re
to
o
v
e
rc
o
m
e
t
h
e
m
u
sin
g
M
u
lt
i
-
A
g
e
n
t
s
y
ste
m
K
ey
w
o
r
d
:
A
d
H
o
c
n
et
w
o
r
k
s
y
s
te
m
E
x
ter
n
al
attac
k
i
n
M
A
NE
T
Flo
o
d
in
g
a
ttac
k
s
Op
ti
m
al
a
g
en
t
s
i
n
m
u
lti
-
a
g
en
t
s
y
s
te
m
Co
p
y
rig
h
t
©
2
0
1
7
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
B
an
d
an
a
Ma
h
ap
atr
a
,
C
o
m
p
u
ter
Scien
ce
&
E
n
g
i
n
ee
r
in
g
Dep
t.
,
Sik
s
h
a
„
O
‟
A
n
u
s
an
d
h
an
U
n
i
v
e
r
s
it
y
,
B
h
u
b
an
e
s
w
ar
,
I
n
d
ia
.
E
m
ail: b
an
d
a
n
a1
1
@
g
m
ai
l.c
o
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
A
d
h
o
c
Net
w
o
r
k
i
s
a
s
y
s
te
m
o
f
w
ir
e
less
m
o
b
ile
n
o
d
e
s
w
h
er
e
a
g
r
o
u
p
o
f
n
o
d
es
w
i
th
i
n
clo
s
e
p
r
o
x
i
m
it
y
m
a
k
e
a
n
et
w
o
r
k
.
Su
ch
a
n
in
f
r
astr
u
ctu
r
e
les
s
an
d
s
elf
co
n
f
i
g
u
r
ed
n
et
w
o
r
k
,
o
n
ac
co
u
n
t
o
f
u
n
a
v
ailab
ili
t
y
o
f
a
p
r
o
p
er
ce
n
tr
alize
d
co
n
tr
o
l
an
d
li
m
ited
r
eso
u
r
ce
s
r
e
m
ai
n
s
v
u
l
n
er
ab
le
to
attac
k
s
[
1
]
.
T
h
e
attac
k
t
y
p
es
ca
n
b
e
b
r
o
ad
ly
c
lass
i
f
ied
i
n
to
eit
h
er
an
e
x
ter
n
al
attac
k
o
r
a
n
i
n
ter
n
al
at
tack
.
I
n
ex
ter
n
al
attac
k
,
attac
k
er
ta
r
g
et
t
h
e
n
et
w
o
r
k
m
ed
iu
m
to
d
is
r
u
p
t
t
h
e
n
o
r
m
al
n
et
w
o
r
k
f
lo
w
.
T
h
e
t
y
p
ical
ex
a
m
p
les
o
f
e
x
ter
n
a
l
attac
k
ca
n
b
e
f
lo
o
d
in
g
o
f
m
ess
a
g
es
o
r
p
r
o
p
ag
atio
n
o
f
f
a
k
e
r
o
u
tin
g
m
e
s
s
a
g
es
t
h
at
g
i
v
e
r
is
e
to
Den
ial
o
f
Ser
v
ice
Attack
.
T
h
e
p
r
ev
en
ti
o
n
m
ec
h
a
n
is
m
s
a
v
ailab
le
to
a
v
o
id
s
u
ch
attac
k
t
y
p
e
s
i
n
tr
ad
itio
n
al
n
et
w
o
r
k
ar
e
m
e
m
b
er
s
h
ip
a
u
t
h
en
tica
tio
n
,
f
ir
e
w
all
w
h
ic
h
f
ail
s
to
w
o
r
k
d
u
e
to
u
n
s
tab
le
n
et
w
o
r
k
m
e
d
iu
m
a
n
d
f
r
eq
u
en
t
to
p
o
lo
g
y
c
h
a
n
g
e
s
[
2
]
.
T
h
e
v
o
latile
to
p
o
lo
g
y
o
f
M
ANE
T
S
d
e
m
an
d
s
co
n
ce
r
n
o
f
th
e
r
e
s
ea
r
ch
er
s
to
f
o
r
m
u
la
te
a
p
r
o
p
er
r
o
u
tin
g
s
c
h
e
m
e
to
ac
h
i
ev
e
r
esil
ie
n
t a
n
d
a
n
ef
f
ec
ti
v
e
c
o
m
m
u
n
icatio
n
a
m
o
n
g
t
h
e
n
o
d
es.
Mo
b
ile
A
g
e
n
ts
ar
e
in
d
ep
en
d
e
n
t
r
o
u
te
s
ea
r
ch
m
e
s
s
a
g
es
th
a
t
p
r
ac
ticall
y
g
o
es a
r
o
u
n
d
th
e
n
e
t
w
o
r
k
f
r
o
m
o
n
e
n
o
d
e
to
an
o
th
er
an
d
u
p
d
ate
th
e
r
o
u
tin
g
tab
le
ac
co
r
d
in
g
to
th
e
n
o
d
es
th
e
y
v
is
it
till
th
e
y
r
ea
ch
d
esti
n
atio
n
[3
]
,
[
4
]
.
T
h
is
tech
n
iq
u
e
as
a
s
o
lu
tio
n
co
u
ld
n
o
t
p
r
o
v
e
ef
f
ec
tiv
e
w
h
e
n
th
e
n
et
w
o
r
k
s
ca
le
s
u
p
m
o
r
eo
v
er
s
in
g
le
d
ep
en
d
en
t
r
o
u
te
as
a
co
m
m
u
n
icat
io
n
m
ed
i
u
m
p
o
s
ed
p
r
o
b
lem
s
lik
e
i
m
p
r
o
p
er
lo
a
d
b
alan
cin
g
,
u
n
r
eliab
le
r
o
u
te
to
d
ep
en
d
u
p
o
n
as
w
ell
a
s
lack
o
f
alter
n
at
iv
e
r
o
u
tes
a
v
ailab
le.
M
u
lti
Ag
en
t
s
y
s
te
m
s
o
l
v
ed
ef
f
icien
tl
y
lo
ad
b
alan
ci
n
g
p
r
o
b
le
m
as
w
ell
a
s
p
r
o
v
id
ed
alter
n
ativ
e
s
o
lu
t
io
n
b
u
t
i
n
cr
ea
s
ed
th
e
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
o
n
p
ar
t
o
f
th
e
n
o
d
e
w
h
ile
g
en
er
ati
n
g
ag
e
n
t
s
o
r
ca
u
s
i
n
g
in
cr
ea
s
e
in
o
v
er
all
n
et
w
o
r
k
tr
a
f
f
ic
b
y
lau
n
c
h
i
n
g
m
u
ltip
le
r
o
u
ti
n
g
m
es
s
ag
e
s
as
A
g
e
n
t
s
[
5
]
.
T
h
er
ef
o
r
e
lau
n
ch
i
n
g
o
f
h
u
g
e
n
u
m
b
er
o
f
Ag
en
t
s
to
m
ai
n
tai
n
th
e
n
et
w
o
r
k
tr
af
f
ic
ten
d
s
to
r
esu
lt
in
in
cr
ea
s
e
o
f
n
et
w
o
r
k
tr
af
f
ic
as
w
ell
as
r
ed
u
ce
d
lif
et
i
m
e
o
f
a
n
o
d
e
af
f
ec
tin
g
t
h
e
o
v
er
all
n
et
w
o
r
k
.
Hen
ce
th
i
s
d
e
m
a
n
d
s
th
e
n
ee
d
to
q
u
an
ti
f
y
o
p
ti
m
al
n
u
m
b
er
o
f
n
o
d
es
s
u
itab
le
f
o
r
a
p
ar
ticu
lar
n
et
w
o
r
k
to
p
o
lo
g
y
f
o
r
a
p
ar
ticu
lar
ti
m
e
[
6
]
.
E
ac
h
ag
e
n
t
s
lau
n
c
h
ed
in
c
u
r
ad
d
itio
n
al
co
s
t
o
n
th
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
2
,
A
p
r
il 2
0
1
7
:
9
19
–
9
25
920
n
o
d
e
h
en
ce
d
ea
th
o
f
an
ag
e
n
t
d
u
e
to
f
lo
o
d
in
g
attac
k
s
ca
n
b
e
co
n
s
id
er
ed
as
a
h
ea
v
y
lo
s
s
o
n
th
e
p
ar
t
o
f
th
e
n
o
d
e.
T
h
e
p
ap
er
p
r
o
v
id
es
a
n
o
v
e
l
t
ec
h
n
iq
u
e
o
f
q
u
a
n
ti
f
y
in
g
t
h
e
o
p
ti
m
al
n
u
m
b
er
o
f
ag
e
n
ts
to
b
e
lau
n
ch
ed
f
o
r
r
o
u
te
s
ea
r
c
h
,
ch
ec
k
i
n
g
f
o
r
p
o
s
s
ib
ilit
ies
o
f
f
l
o
o
d
in
g
attac
k
in
t
h
e
n
et
w
o
r
k
,
id
e
n
ti
f
y
in
g
m
alicio
u
s
n
o
d
es
a
n
d
tak
i
n
g
e
f
f
ec
ti
v
e
m
ea
s
u
r
es
to
b
lo
ck
th
e
n
o
d
e
w
h
i
le
u
s
i
n
g
a
lter
n
ati
v
e
r
o
u
tes
p
r
o
v
id
ed
b
y
m
u
ltip
le
a
g
en
ts
t
o
m
ai
n
tai
n
th
e
f
le
x
ib
le
an
d
r
o
b
u
s
t c
o
m
m
u
n
icat
io
n
n
e
t
w
o
r
k
f
lo
w
[7
]
,
[
8
]
.
2.
RE
L
AT
E
D
P
AP
E
RS
R
o
m
it
r
o
y
C
h
o
u
d
h
u
r
y
,
S.
B
an
d
y
o
p
ad
h
y
a
y
an
d
Kr
is
h
n
a
P
au
l
[
9
]
p
r
o
p
o
s
ed
a
d
is
tr
ib
u
ted
Me
ch
an
is
m
f
o
r
T
o
p
o
lo
g
y
d
is
co
v
er
y
i
n
Ad
Ho
c
W
ir
eless
Net
w
o
r
k
s
U
s
in
g
Mo
b
ile
Ag
e
n
ts
w
h
er
e
t
h
e
y
h
a
v
e
d
e
f
in
ed
a
co
n
ce
p
t
o
f
i
n
f
o
r
m
atio
n
ag
in
g
o
n
li
n
k
a
f
f
i
n
it
y
b
ased
o
n
w
h
ich
a
p
r
ed
icti
v
e
al
g
o
r
ith
m
r
u
n
n
i
n
g
o
n
ea
ch
n
o
d
e
ca
n
p
r
ed
ict
th
e
cu
r
r
en
t
Net
w
o
r
k
to
p
o
lo
g
y
b
ased
o
n
th
e
cu
r
r
en
t
Net
w
o
r
k
i
n
f
o
r
m
atio
n
s
to
r
ed
at
th
at
n
o
d
e
.
L
in
k
af
f
in
i
t
y
,
as
s
o
ciate
d
w
it
h
a
lin
k
b
et
w
ee
n
t
w
o
n
o
d
es
n
an
d
m
,
is
a
p
r
ed
ictio
n
ab
o
u
t
s
p
an
o
f
lif
e
o
f
th
at
li
n
k
in
a
p
ar
ticu
lar
co
n
te
x
t.
T
h
e
y
h
a
v
e
ap
p
l
ied
th
is
n
o
tio
n
to
p
r
ed
ict
to
p
o
lo
g
y
b
y
ea
c
h
n
o
d
e
an
d
th
u
s
b
e
ca
u
tio
u
s
b
ef
o
r
e
d
ata
tr
an
s
f
er
is
i
n
itiated
.
R
y
o
k
ich
i
On
is
h
i
Sa
m
y
as
u
Y
a
m
ag
u
c
h
i,
Hir
ao
Ki
Mo
r
in
o
Hito
s
h
io
A
id
a
J
ad
o
s
aito
p
r
o
p
o
s
ed
“
T
h
e
Mu
lti
Ag
e
n
t
S
y
s
te
m
f
o
r
D
y
n
a
m
ic
Net
w
o
r
k
R
o
u
ti
n
g
”.
T
h
e
y
p
r
o
p
o
s
ed
th
at
b
y
m
u
lt
ip
l
y
i
n
g
ea
c
h
en
tr
y
i
n
r
o
u
tin
g
tab
le
to
s
to
r
e
m
u
c
h
m
o
r
e
in
f
o
r
m
atio
n
f
r
o
m
Ag
en
t
s
ev
alu
a
tin
g
t
h
e
m
to
m
a
k
e
b
etter
u
s
e
o
f
in
f
o
r
m
atio
n
s
u
cc
ee
d
ed
in
r
atin
g
t
h
e
Net
w
o
r
k
co
n
tin
u
o
u
s
l
y
b
y
4
0
%.
T
h
ey
also
s
u
g
g
e
s
ted
th
at
Ag
en
t
s
th
e
m
s
el
v
es
ar
e
o
f
te
n
w
r
itte
n
in
r
elati
v
el
y
s
lo
w
in
te
r
p
r
eted
lan
g
u
ag
e
s
an
d
s
li
g
h
tl
y
g
ain
w
ei
g
h
t
f
o
r
co
n
tain
i
n
g
co
d
e.
Ho
w
e
v
er
if
th
e
en
tire
s
y
s
te
m
s
a
v
es
m
o
r
e
b
an
d
w
id
t
h
r
eso
u
r
ce
f
o
r
co
n
tr
o
l
an
d
r
ea
cts
m
o
r
e
q
u
ick
l
y
t
h
ese
o
v
er
h
ea
d
s
o
f
Ag
en
t
s
m
i
g
h
t b
e
ac
ce
p
tab
le.
B
o
u
n
p
ad
ith
Kan
n
h
o
v
o
n
g
,
Hid
e
h
is
a
Na
k
a
y
a
m
a,
Yo
s
h
iak
i
Ne
m
o
to
,
an
d
Neik
ato
[
1
0
]
h
av
e
co
n
d
u
cted
a
s
u
r
v
e
y
o
n
th
e
s
tate
o
f
th
e
ar
t
o
f
s
ec
u
r
it
y
i
s
s
u
es
in
Ma
n
et.
T
h
e
y
h
av
e
ex
a
m
i
n
ed
r
o
u
ti
n
g
attac
k
s
lik
e
li
n
k
s
p
o
o
f
in
g
,
co
ll
u
d
in
g
m
i
s
er
l
y
attac
k
s
an
d
d
ef
e
n
s
e
m
ec
h
a
n
i
s
m
s
a
g
ai
n
s
t
s
u
ch
attac
k
s
in
ex
i
s
ti
n
g
M
A
NE
T
p
r
o
to
co
ls
.
P
in
g
Yi,
Z
h
o
u
li
n
Dai,
Sh
i
y
o
n
g
Z
h
a
n
g
,
Yip
i
n
g
Z
h
o
n
g
i
n
th
eir
p
ap
er
[
1
1
]
h
av
e
d
esig
n
ed
a
g
en
er
i
c
d
ef
en
s
e
ag
ai
n
s
t
th
e
A
d
h
o
c
Fl
o
o
d
in
g
A
ttac
k
in
m
o
b
ile
A
d
h
o
c
Net
w
o
r
k
.
T
h
eir
d
esig
n
ed
m
ec
h
a
n
i
s
m
ai
m
s
at
r
ec
o
r
d
in
g
th
e
r
ate
o
f
r
o
u
te_
r
e
q
u
est
m
e
s
s
ag
e.
On
ce
th
e
t
h
r
es
h
o
ld
is
e
x
ce
ed
ed
n
o
d
es
d
en
y
an
y
f
u
r
th
er
r
eq
u
e
s
t
p
ac
k
ets f
r
o
m
th
e
i
n
tr
u
d
er
.
3
3
3
.
Me
en
ak
s
h
i
P
atel,
San
j
ay
S
h
ar
m
a,
Div
y
a
S
h
ar
an
h
a
v
e
p
r
o
p
o
s
ed
in
th
eir
p
ap
er
[
1
2
]
th
e
m
ec
h
a
n
i
s
m
f
o
r
d
etec
tio
n
an
d
p
r
ev
en
tio
n
o
f
Flo
o
d
in
g
A
ttac
k
u
s
in
g
SV
M.
T
h
e
y
h
a
v
e
s
ch
e
m
ed
a
n
e
w
m
eth
o
d
b
ased
o
n
A
O
DV
b
eh
a
v
io
r
al
m
etr
ic
s
f
o
r
d
etec
tin
g
a
n
d
p
r
ev
en
tin
g
F
lo
o
d
in
g
A
ttac
k
s
in
M
ANE
T
S.
T
h
ey
h
a
v
e
u
s
ed
th
e
P
DE
R
,
C
o
an
d
P
MI
R
as
m
etr
i
cs to
p
r
ed
ict
th
e
Flo
o
d
in
g
atta
ck
s
.
3.
DE
T
E
C
T
I
N
G
AN
D
AVO
I
D
I
NG
F
L
O
O
DIN
G
A
T
T
A
CK
USI
N
G
M
UL
T
I
P
L
E
A
G
E
N
T
S
T
h
e
p
ap
er
aim
s
a
t
p
r
o
v
id
in
g
a
tech
n
iq
u
e
to
d
etec
t
f
lo
o
d
in
g
attac
k
s
i
n
th
e
b
u
f
f
er
a
n
d
u
s
e
alter
n
ati
v
e
r
o
u
tes to
m
ai
n
tai
n
a
r
esil
ie
n
t n
et
w
o
r
k
.
A
LG
ORI
T
HM
–
1
T
O DET
EC
T
A
ND
A
V
OID
F
LOOD
IN
G
AT
TACKS
S
tart
S
tep
1
.
S
e
t
Ne
a
re
st_
n
e
ig
h
b
o
r
=
n
o
o
f
h
e
ll
o
_
m
sg
S
tep
2
.
Ca
lcu
late
A
g
e
n
ts
to
b
e
lau
n
c
h
e
d
=
n
e
a
re
st_
n
e
ig
h
b
o
u
r/2
Co
u
n
ter = C
o
u
n
ter + 1
S
tep
3
.
L
a
u
n
c
h
a
g
e
n
ts
in
n
e
tw
o
rk
S
tep
4
.
If
f
lo
o
d
i
n
g
_
a
tt
a
c
k
=
=
y
e
s
M
a
li
c
io
u
s_
n
o
d
e
=
n
o
d
e
_
id
//
C
h
e
c
k
m
e
m
o
r
y
ro
u
te t
a
b
le
S
tep
5
.
F
o
r
i
=
1
to
N
//
N i
s
n
o
o
f
ro
w
s in
ro
u
te t
a
b
le
If
T
a
b
le [
i]
=
M
a
li
c
o
u
s_
n
o
d
e
a
s in
term
e
d
iate
n
o
d
e
T
a
b
le[
i
]
=
T
a
b
le
[
i+
1
]
.
En
d
A
l
g
o
r
ith
m
-
1
r
ep
r
esen
ts
th
e
p
r
o
ce
d
u
r
e
ad
o
p
t
ed
b
y
t
h
e
p
r
o
p
o
s
ed
m
o
d
el
f
o
r
d
etec
tio
n
o
f
Flo
o
d
in
g
A
ttac
k
s
an
d
m
ea
s
u
r
es
ad
o
p
ted
to
av
o
id
it
w
h
ic
h
is
s
h
o
w
n
as
Fig
u
r
e
1.
T
h
e
Fig
u
r
e
1
s
h
o
w
s
th
e
p
r
o
p
o
s
ed
m
o
d
el
co
n
s
i
s
ti
n
g
o
f
3
m
ain
m
o
d
u
les.
Mo
d
u
le1
is
g
en
er
at
in
g
o
p
ti
m
al
n
u
m
b
er
o
f
ag
e
n
t
s
,
m
o
d
u
le2
i
s
ab
o
u
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
S
ec
u
r
ity
Mea
s
u
r
e
to
Dete
ct
a
n
d
A
vo
id
F
l
o
o
d
in
g
A
tta
ck
s
Usi
n
g
Mu
lti A
g
en
t
S
ystem
.
.
.
.
(
B
a
n
d
a
n
a
Ma
h
a
p
a
tr
a
)
921
d
et
ec
tio
n
o
f
f
lo
o
d
in
g
attac
k
s
in
b
u
f
f
er
a
n
d
m
o
d
u
le
3
d
ea
ls
w
it
h
m
ea
s
u
r
es
to
av
o
id
f
l
o
o
d
in
g
attac
k
s
a
n
d
m
ai
n
tai
n
in
g
a
r
esil
ien
t
n
et
w
o
r
k
.
T
h
e
n
o
d
e
f
ir
s
t
ca
lc
u
late
s
th
e
o
p
tim
a
l
n
u
m
b
er
o
f
Ag
e
n
ts
to
b
e
lau
n
c
h
ed
in
t
h
e
n
et
w
o
r
k
co
n
s
id
er
in
g
th
e
c
u
r
r
en
t to
p
o
lo
g
y
o
r
n
et
w
o
r
k
s
ce
n
ar
i
o
[
5
]
.
M
o
d
u
le
2
M
o
d
u
le
1
M
o
d
u
le 3
Fig
u
r
e
1
.
P
r
o
p
o
s
ed
No
d
e
A
r
ch
itectu
r
e
f
o
r
Dete
cti
n
g
an
d
av
o
i
d
in
g
f
lo
o
d
in
g
at
tack
s
T
h
ese
ag
e
n
ts
m
o
v
e
ar
o
u
n
d
f
r
o
m
o
n
e
n
o
d
e
to
o
th
er
n
o
d
e
in
s
ea
r
ch
o
f
t
h
e
d
es
tin
a
tio
n
w
h
ile
k
ee
p
in
g
a
tr
ac
k
o
f
t
h
e
n
o
d
e
th
e
y
v
is
it
d
u
r
in
g
th
eir
s
ea
r
ch
p
er
io
d
.
T
h
ese
ag
en
ts
r
et
u
r
n
b
ac
k
to
th
e
o
r
ig
i
n
al
n
o
d
e
o
n
ce
th
e
y
r
ea
ch
t
h
e
d
esti
n
atio
n
u
s
i
n
g
t
h
e
s
a
m
e
r
o
u
te.
T
h
ese
m
es
s
ag
e
s
ar
e
r
ec
eiv
ed
b
y
t
h
e
n
o
d
e
an
d
ar
e
ac
cu
m
u
la
ted
i
n
th
e
in
co
m
i
n
g
m
e
s
s
a
g
e
b
u
f
f
er
w
h
er
e
th
e
o
cc
u
r
r
en
ce
o
f
f
lo
o
d
in
g
a
ttack
i
s
ch
ec
k
ed
in
t
h
e
b
u
f
f
er
it
s
elf
s
o
as
to
p
r
ev
en
t
w
asta
g
e
o
f
p
o
w
er
in
r
ea
d
in
g
s
a
m
e
m
es
s
ag
e
a
g
ai
n
.
T
h
e
d
etec
tio
n
o
f
f
lo
o
d
in
g
attac
k
is
d
ea
lt
b
y
b
lo
ck
i
n
g
t
h
e
n
o
d
e
g
en
er
ati
n
g
m
alicio
u
s
m
ess
a
g
es
an
d
d
is
ca
r
d
in
g
all
t
h
e
r
o
u
tes
t
h
at
h
as
t
h
e
m
alic
i
o
u
s
n
o
d
e
as
an
in
ter
m
ed
iar
y
n
o
d
e
to
r
ea
c
h
d
esti
n
atio
n
.
T
h
e
m
u
ltip
le
ag
e
n
ts
h
er
e
co
llect
d
if
f
er
en
t
av
a
ilab
le
r
o
u
tes
f
r
o
m
a
s
o
u
r
ce
to
d
esti
n
atio
n
t
h
at
h
e
l
p
s
n
o
d
e
to
m
ai
n
tai
n
th
e
co
m
m
u
n
icatio
n
n
et
w
o
r
k
a
s
w
ell
as
t
h
e
co
n
n
ec
ti
v
it
y
t
h
at
m
ak
e
s
it
a
r
esil
ien
t
o
r
a
r
o
b
u
s
t
n
et
w
o
r
k
ca
p
ab
le
o
f
h
a
n
d
lin
g
f
lo
o
d
in
g
attac
k
s
.
3
.
1
.
O
pti
m
a
l
nu
m
b
er
o
f
Ag
ent
s
T
h
e
w
ir
ele
s
s
A
d
Ho
c
Ne
t
w
o
r
k
w
h
en
s
ca
led
u
p
it
b
ec
o
m
es
c
h
alle
n
g
i
n
g
f
o
r
t
h
e
n
o
r
m
a
l
w
ir
eles
s
r
o
u
tin
g
p
r
o
to
co
ls
to
k
ee
p
th
e
Net
w
o
r
k
R
o
u
ti
n
g
in
f
o
r
m
at
io
n
cu
r
r
e
n
t.
Hen
ce
th
e
Ag
e
n
ts
b
ec
o
m
e
n
ec
es
s
ar
y
o
n
ce
t
h
e
Net
w
o
r
k
s
ize
i
s
h
u
g
e.
B
u
t
a
Si
n
g
le
Ag
e
n
t
Ne
t
w
o
r
k
also
h
a
s
it
s
s
h
o
r
t
co
m
i
n
g
s
lik
e
i
m
p
r
o
p
er
lo
ad
b
alan
cin
g
an
d
o
n
l
y
a
s
i
n
g
le
co
m
m
u
n
icatio
n
r
o
u
te
to
r
ea
c
h
f
r
o
m
s
o
u
r
ce
to
d
esti
n
atio
n
w
h
ich
i
s
also
n
o
t
d
ep
en
d
ab
le
d
u
e
to
A
d
Ho
c
n
atu
r
e
o
f
th
e
Ne
t
w
o
r
k
.
T
h
is
p
r
o
b
le
m
ca
n
b
e
ad
d
r
ess
ed
b
y
u
s
i
n
g
m
u
lti
p
le
a
g
e
n
t
i
n
th
e
Net
w
o
r
k
f
o
r
co
m
m
u
n
icati
o
n
.
Mu
lti
-
Ag
e
n
ts
la
u
n
c
h
ed
in
th
e
n
et
w
o
r
k
th
o
u
g
h
h
elp
s
i
n
cr
ea
s
in
g
t
h
e
n
u
m
b
e
r
o
f
r
ec
eiv
ed
n
o
d
es
a
n
d
th
r
o
u
g
h
p
u
t
also
i
n
cr
ea
s
es
th
e
co
m
p
u
tat
io
n
al
o
v
er
h
ea
d
an
d
n
et
w
o
r
k
b
a
n
d
w
id
th
.
Mo
r
eo
v
er
co
n
tin
u
o
u
s
g
r
o
w
t
h
in
n
u
m
b
er
o
f
a
g
en
ts
b
ec
o
m
es
a
b
o
ttlen
ec
k
w
it
h
n
o
s
ig
n
i
f
ica
n
t
i
m
p
r
o
v
e
m
e
n
t
b
r
o
u
g
h
t
o
n
t
h
e
n
et
w
o
r
k
p
er
f
o
r
m
a
n
ce
.
T
h
is
d
e
m
an
d
s
lau
n
ch
o
f
o
p
ti
m
al
n
u
m
b
er
o
f
Ag
en
ts
in
th
e
n
et
w
o
r
k
co
n
s
id
er
in
g
th
e
v
ar
iab
le
co
n
s
t
r
ain
ts
li
k
e
n
u
m
b
er
o
f
r
ec
eiv
e
d
p
ac
k
ets,
d
r
o
p
p
e
d
p
ac
k
ets,
No
r
m
a
lized
R
o
u
ti
n
g
Ov
er
lo
ad
,
co
m
p
u
tatio
n
a
l o
v
er
h
ea
d
,
etc
[
7
]
.
C
o
n
s
tr
ain
ed
o
p
ti
m
izatio
n
is
t
h
e
p
r
o
ce
s
s
o
f
o
p
ti
m
iz
in
g
a
n
o
b
j
ec
tiv
e
f
u
n
ctio
n
w
it
h
r
esp
e
ct
to
s
o
m
e
v
ar
iab
les
i
n
th
e
p
r
ese
n
ce
o
f
t
h
o
s
e
v
ar
iab
le
s
.
Min
i
m
u
m
o
f
co
n
s
tr
ain
ed
n
o
n
li
n
ea
r
m
u
l
tiv
ar
iab
le
f
u
n
ctio
n
is
a
g
r
ad
ien
t
b
ased
m
et
h
o
d
th
at
is
d
esig
n
ed
to
w
o
r
k
w
h
er
e
o
b
j
ec
tiv
e
f
u
n
ct
io
n
a
n
d
th
e
co
n
s
tr
ain
t
f
u
n
c
tio
n
ar
e
b
o
t
h
co
n
tin
u
o
u
s
f
ir
s
t
d
er
i
v
ati
v
es.
I
t
u
s
es
a
s
eq
u
e
n
tial
q
u
ad
r
atic
p
r
o
g
r
am
m
i
n
g
(
SQP
)
m
et
h
o
d
,
w
h
er
e
t
h
e
f
u
n
ctio
n
s
o
lv
es a
q
u
ad
r
atic
p
r
o
g
r
a
m
m
i
n
g
s
u
b
p
r
o
b
le
m
at
ea
ch
iter
ati
o
n
.
I
t
m
a
y
b
e
ca
lcu
lated
as
–
Min
ƒ
(
x
)
s
u
ch
t
h
at
:
G
e
n
e
r
a
te
o
p
ti
m
a
l
n
u
m
b
e
r
o
f
n
o
d
e
s
In
c
o
m
in
g
m
e
ss
a
g
e
b
u
f
f
e
r
A
lt
e
rn
a
ti
v
e
a
v
a
il
a
b
le
ro
u
tes
Ch
e
c
k
f
o
r
F
lo
o
d
i
n
g
A
tt
a
c
k
s
Up
d
a
te
ro
u
tes
i
n
m
e
m
o
r
y
Id
e
n
ti
f
y
m
a
li
c
io
u
s
n
o
d
e
&
b
l
o
c
k
it
s
in
c
o
m
in
g
m
e
ss
a
g
e
Re
m
o
v
e
ro
u
tes
w
it
h
m
a
li
c
io
u
s
node
Net
w
o
r
k
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
2
,
A
p
r
il 2
0
1
7
:
9
19
–
9
25
922
{
(
)
(
)
3
.
2
.
Det
ec
t
io
n o
f
F
lo
o
din
g
a
t
t
a
ck
s
in B
uff
er
Flo
o
d
in
g
i
s
a
d
en
ial
o
f
s
er
v
ice
attac
k
d
esi
g
n
ed
to
d
eg
r
ad
e
th
e
p
er
f
o
r
m
a
n
ce
o
f
th
e
n
et
w
o
r
k
o
r
n
o
d
e
b
y
f
lo
o
d
in
g
it
w
i
th
lar
g
e
a
m
o
u
n
t
o
f
tr
af
f
ic
f
lo
o
d
.
Attack
s
o
cc
u
r
w
h
e
n
a
n
e
t
w
o
r
k
o
r
s
er
v
ice
b
ec
o
m
e
s
w
ei
g
h
t d
o
wn
w
it
h
p
ac
k
et
s
i
n
itiated
in
co
m
p
lete
co
n
n
ec
tio
n
r
eq
u
est
s
t
h
a
t
it
ca
n
n
o
lo
n
g
er
p
r
o
ce
s
s
a
g
en
u
i
n
e
co
n
n
ec
t
io
n
r
eq
u
ests
.
B
y
f
lo
o
d
in
g
a
s
er
v
er
o
r
h
o
s
t
w
it
h
co
n
n
ec
tio
n
s
t
h
at
ca
n
n
o
t
b
e
co
m
p
leted
,
t
h
e
f
lo
o
d
attac
k
ev
e
n
t
u
all
y
f
ill
s
th
e
h
o
s
t
m
e
m
o
r
y
b
u
f
f
er
.
On
ce
th
is
b
u
f
f
er
is
f
u
ll
n
o
f
u
r
t
h
er
co
n
n
ec
tio
n
s
ca
n
b
e
m
ad
e
an
d
r
esu
lt
i
s
Den
ia
l
o
f
Ser
v
ice
s
[7
]
,
[
8
]
.
T
h
e
p
r
o
p
o
s
ed
Kn
o
w
led
g
e
B
as
ed
m
o
d
el
co
n
s
i
s
ts
o
f
a
b
u
f
f
er
t
h
at
r
ec
ei
v
es
t
h
e
in
co
m
i
n
g
m
e
s
s
ag
e
s
an
d
th
e
s
i
g
n
at
u
r
e
m
o
d
u
le
t
h
at
co
m
p
r
i
s
es
o
f
m
e
s
s
a
g
e
s
ig
n
at
u
r
es
th
at
ar
e
ca
te
g
o
r
ized
as
Flo
o
d
in
g
attac
k
a
n
d
ar
e
s
u
b
s
eq
u
en
t
l
y
b
lo
ck
ed
.
T
h
e
i
n
co
m
in
g
m
es
s
ag
e
s
ar
e
f
ir
s
t
r
ec
eiv
ed
b
y
t
h
e
b
u
f
f
er
an
d
ar
e
p
atter
n
m
atch
ed
w
i
th
th
e
s
i
g
n
at
u
r
e
m
o
d
u
le
to
s
ee
i
f
th
e
m
ess
a
g
e
is
s
e
n
t
b
y
a
m
alicio
u
s
n
o
d
e
cr
ea
tin
g
S
y
n
-
Fl
o
o
d
attac
k
.
I
f
th
e
m
es
s
ag
e
is
a
n
o
n
m
atc
h
t
h
en
it
is
r
ec
h
ec
k
ed
w
it
h
i
n
t
h
e
b
u
f
f
er
f
o
r
tr
ac
in
g
t
h
e
p
o
s
s
ib
ili
t
y
o
f
Attac
k
.
I
f
t
h
e
m
es
s
ag
e
i
s
f
o
u
n
d
to
b
e
r
ep
ea
t
ed
b
ey
o
n
d
a
ce
r
tain
t
h
r
esh
o
ld
,
th
e
m
e
s
s
a
g
e
is
u
p
d
ated
in
th
e
s
ig
n
at
u
r
e
m
o
d
u
le
ca
teg
o
r
izin
g
it a
s
Do
S a
ttac
k
p
atter
n
.
In
c
o
mi
n
g
M
e
ssag
e
s
(
Patter
n
Ma
tch
in
g
)
N
Y
(
u
p
d
a
te sig
n
a
tu
re
b
lo
c
k
)
(
M
e
ss
a
g
e
re
c
h
e
c
k
e
d
f
o
r
d
u
p
li
c
a
ti
o
n
)
Fig
u
r
e
2.
P
r
o
p
o
s
ed
Mo
d
el
f
o
r
d
etec
tin
g
S
y
n
-
Flo
o
d
A
t
tack
s
i
n
B
u
f
f
er
A
LG
ORI
T
H
M
-
2
A
LG
ORI
T
HM
T
O DE
T
EC
T
F
L
OO
DIN
G
A
TT
A
CKS
IN
BUFF
ER
S
tart
S
e
t
T
h
re
sh
o
ld
T
In
c
o
m
in
g
M
e
ss
a
g
e
→
Bu
ff
e
r
If
M
e
ss
a
g
e
=
=
sig
n
a
tu
re
s in
m
e
m
o
r
y
Co
u
n
ter = C
o
u
n
ter + 1
El
se
S
e
t
i
=
1
W
h
il
e
(Bu
f
f
e
r
≠
NU
LL
)
If
Bu
f
f
e
r
[
0
]
=
=
Bu
f
f
e
r[
i]
B
u
f
fe
r[
0
]
→
S
ig
n
a
tu
re
s in
m
e
m
o
r
y
De
lete
M
sg
[
B
u
f
f
e
r[0
]]
El
se
i= i
+
1
If
c
o
u
n
ter > T
h
re
sh
o
ld
B
lo
c
k
th
e
r
o
tes
w
it
h
n
o
d
e
_
i
d
in
th
e
m
e
m
o
r
y
B
u
f
f
e
r
En
d
…
S
i
g
n
a
t
u
r
e
o
f
M
S
G
w
i
t
h
m
u
l
t
i
p
l
e
c
o
p
i
e
s i
n
b
u
f
f
e
r
C
o
u
n
t
e
r
=
C
o
u
n
t
e
r
+1
I
f
c
o
u
n
t
e
r
>
T
F
l
o
o
d
i
n
g
A
t
t
a
c
k
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
S
ec
u
r
ity
Mea
s
u
r
e
to
Dete
ct
a
n
d
A
vo
id
F
l
o
o
d
in
g
A
tta
ck
s
Usi
n
g
Mu
lti A
g
en
t
S
ystem
.
.
.
.
(
B
a
n
d
a
n
a
Ma
h
a
p
a
tr
a
)
923
3
.
3
.
M
e
a
s
ures t
o
Av
o
id F
lo
o
din
g
At
t
a
ck
s
a
nd
M
a
inta
in a
re
s
ilient
Net
w
o
rk
T
h
is
m
o
d
u
le
is
ca
p
ab
le
o
f
b
o
t
h
id
en
ti
f
y
i
n
g
m
alicio
u
s
n
o
d
es
as
w
ell
as
ta
k
i
n
g
p
r
ev
e
n
ti
v
e
m
ea
s
u
r
es
to
av
o
id
s
u
c
h
attac
k
m
ai
n
ta
i
n
in
g
a
r
o
b
u
s
t
an
d
r
esil
ie
n
t
n
et
w
o
r
k
.
On
ce
t
h
e
m
es
s
a
g
e
b
u
f
f
er
en
co
u
n
ter
s
a
r
ep
ea
ted
m
es
s
ag
e
p
atter
n
b
e
y
o
n
d
t
h
e
t
h
r
esh
o
ld
lev
e
ls
,
t
h
e
n
o
d
e
id
o
f
t
h
e
m
alicio
u
s
n
o
d
e
s
e
n
d
in
g
m
e
s
s
a
g
es i
s
id
e
n
ti
f
ied
an
d
all
f
u
r
t
h
er
m
es
s
ag
e
s
f
r
o
m
th
e
n
o
d
e
is
b
lo
ck
ed
.
T
h
e
r
o
u
tes
av
ailab
le
w
it
h
th
e
n
o
d
e
h
a
v
in
g
t
h
e
m
alicio
u
s
n
o
d
e
as
a
n
i
n
ter
m
ed
iate
o
n
e
is
b
lo
ck
ed
a
n
d
alter
n
ati
v
e
r
o
u
tes
a
v
ailab
le
th
r
o
u
g
h
m
u
lti
ag
e
n
ts
is
u
s
ed
f
o
r
m
es
s
ag
e
co
m
m
u
n
icatio
n
b
et
w
ee
n
th
e
s
o
u
r
ce
an
d
d
esti
n
atio
n
n
o
d
e.
4.
E
XP
E
R
I
M
E
NT
A
L
RE
SUL
T
S
I
n
t
h
is
w
o
r
k
w
e
h
a
v
e
a
n
al
y
ze
d
th
e
b
eh
a
v
io
r
o
f
v
ar
y
in
g
n
u
m
b
er
o
f
Ag
e
n
ts
ac
r
o
s
s
d
i
f
f
er
e
n
t
n
et
w
o
r
k
to
p
o
lo
g
ies.
Her
e
th
e
co
n
s
tr
ai
n
ts
e
f
f
ec
ti
n
g
t
h
e
o
v
er
all
n
et
wo
r
k
p
er
f
o
r
m
a
n
ce
i
s
co
n
s
id
er
ed
w
h
ile
q
u
a
n
ti
f
y
in
g
th
e
ap
p
r
o
x
-
o
p
ti
m
a
l
n
u
m
b
er
o
f
Ag
en
t
s
.
T
h
e
co
n
s
tr
ai
n
ts
e
f
f
ec
tin
g
th
e
n
et
w
o
r
k
p
er
f
o
r
m
a
n
ce
co
n
s
id
er
ed
ar
e
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
o
n
n
o
d
es,
No
r
m
alize
d
R
o
u
ti
n
g
Ov
er
lo
ad
,
an
d
th
r
o
u
g
h
p
u
t o
f
t
h
e
Ne
t
w
o
r
k
.
T
h
e
Fig
u
r
e
3
s
h
o
w
s
th
e
i
m
p
ac
t
o
f
ch
an
g
e
in
n
u
m
b
er
o
f
A
g
e
n
ts
la
u
n
c
h
ed
in
th
e
n
e
t
w
o
r
k
o
n
d
if
f
er
en
t
co
n
s
tr
ain
ts
i
n
v
o
lv
ed
in
d
eter
m
i
n
in
g
t
h
e
o
v
er
all
n
et
w
o
r
k
p
er
f
o
r
m
a
n
ce
h
en
ce
al
s
o
d
eter
m
in
in
g
t
h
e
ap
r
o
x
o
p
tim
a
l
n
u
m
b
er
o
f
ag
e
n
ts
to
b
e
lau
n
ch
ed
in
th
e
n
et
w
o
r
k
b
y
a
n
o
d
e
w
h
er
e
th
e
v
ar
iab
le
1
i
s
th
e
t
h
r
o
u
g
h
p
u
t,
2
i
s
n
o
r
m
ali
s
ed
r
o
u
ti
n
g
o
v
er
lo
ad
a
n
d
3
is
t
h
e
co
m
p
u
tatio
n
al
o
v
e
r
h
ea
d
in
c
u
r
ed
u
p
o
n
n
o
d
es.
U
s
in
g
T
r
u
s
t
R
e
g
eo
n
R
ef
lec
tiv
e
Alg
o
r
it
h
m
a
n
d
F
-
Min
co
n
-
C
o
n
s
tr
ain
ed
n
o
n
-
len
e
ar
m
in
i
m
izat
io
n
t
h
e
p
er
ito
Op
ti
m
al
So
l
u
tio
n
f
o
r
A
p
r
o
x
o
p
ti
m
al
n
u
m
b
er
o
f
Ag
e
n
ts
t
h
at
g
iv
e
s
m
a
x
i
m
u
m
b
e
n
e
f
it to
th
e
n
et
w
o
r
k
is
o
b
tain
ed
,
s
h
o
w
n
i
n
Fi
g
u
r
e
4.
Fig
u
r
e
3
.
I
m
p
ac
t o
n
C
o
n
s
tr
ain
ts
d
u
e
to
ch
a
n
g
e
i
n
n
u
m
b
er
o
f
Ag
en
t
s
L
au
n
c
h
ed
Fig
u
r
e
4
.
P
er
ito
O
p
tim
a
l So
lu
tio
n
o
b
tain
ed
f
r
o
m
T
r
u
s
t Reg
io
n
Alg
o
r
it
h
m
Fig
u
r
e
5
.
Kn
o
w
led
g
e
B
ased
m
eth
o
d
Vs
A
ODV
p
r
o
to
co
l
Fig
u
r
e
6
.
A
lar
m
s
Ge
n
er
ated
in
th
e
Kn
o
w
led
g
e
b
ased
m
o
d
el
o
f
Flo
o
d
Dete
ctio
n
W
e
s
i
m
u
la
ted
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
in
NS
-
2
e
n
v
ir
o
n
m
en
t
u
s
in
g
AODV
p
r
o
to
co
l.
T
h
e
r
esu
lt
s
o
b
tain
ed
as
p
r
o
j
ec
te
d
in
th
e
Fig
u
r
e
5
s
h
o
w
s
a
s
ig
n
i
f
ican
t
im
p
r
o
v
e
m
e
n
t
in
d
etec
tio
n
o
f
Flo
o
d
in
g
A
ttac
k
s
1
2
F
l
o
o
d
D
e
t
e
ct
i
o
n
T
e
ch
n
i
q
u
e
s
0
10
20
30
40
50
60
70
80
90
A
t
t
a
c
k
D
e
t
e
c
t
e
d
%
a
g
e
1
-
K
n
o
w
l
e
d
g
e
b
a
s
e
-
2
-
AO
D
V
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
2
,
A
p
r
il 2
0
1
7
:
9
19
–
9
25
924
g
en
er
ated
i
n
th
e
n
et
w
o
r
k
i
n
co
m
p
ar
i
s
o
n
to
A
ODV
p
r
o
to
co
l.
Fig
u
r
e
6
s
h
o
w
s
t
h
e
i
n
cr
ea
s
e
i
n
tr
u
e
p
o
s
itiv
e
alo
n
g
w
it
h
r
ed
u
ctio
n
o
f
f
alse
p
o
s
iti
v
e
g
e
n
e
r
ated
in
t
h
e
n
et
w
o
r
k
[
4
]
.
T
h
e
tr
u
e
p
o
s
itiv
e
lead
s
n
e
x
t
to
th
e
k
n
o
w
led
g
e
b
ase
u
p
d
atin
g
t
h
u
s
en
ab
li
n
g
th
e
s
i
g
n
at
u
r
e
u
p
d
atio
n
d
y
n
a
m
i
ca
ll
y
w
h
ich
i
s
ad
v
an
ta
g
eo
u
s
t
o
th
e
MA
NE
T
s
,
th
at
ar
e
th
e
m
s
el
v
es
d
y
n
a
m
ic
i
n
n
atu
r
e
a
n
d
ar
e
eq
u
ip
p
ed
w
it
h
li
m
ited
r
e
s
o
u
r
ce
s
to
r
el
y
u
p
o
n
,
h
en
ce
d
e
m
a
n
d
s
co
n
tin
u
o
u
s
s
i
g
n
atu
r
e
to
b
e
u
p
d
ated
.
4
.
1
.
Resul
t
Ana
ly
s
i
s
T
h
e
p
r
o
p
o
s
ed
k
n
o
w
led
g
eb
a
s
e
Do
S
d
etec
tio
n
m
o
d
el
s
i
m
u
late
d
g
iv
es
a
r
is
e
i
n
t
h
r
o
u
g
h
p
u
t
b
y
3
7
.
3
3
%
an
d
in
cr
ea
s
e
s
t
h
e
p
ac
k
et
d
eli
v
er
y
r
atio
a
s
s
h
o
w
n
i
n
t
h
e
Fi
g
u
r
e
5
as
w
el
l a
s
r
ed
u
ce
s
th
e
e
n
d
to
en
d
d
ela
y
g
i
v
i
n
g
a
s
ig
n
i
f
ica
n
t i
m
p
r
o
v
e
m
en
t o
v
e
r
th
e
n
et
w
o
r
k
p
er
f
o
r
m
an
ce
.
Fi
g
u
r
e
7
a
n
d
8
s
h
o
w
s
t
h
e
No
r
m
a
l Ro
u
t
in
g
o
v
er
lo
ad
an
d
Ov
er
all
P
ac
k
ets
Dr
o
p
p
e
d
in
an
attac
k
s
ce
n
ar
io
.
T
h
e
r
esu
lts
s
h
o
w
s
a
s
ig
n
i
f
ica
n
t
i
m
p
r
o
v
e
m
e
n
t
in
m
ai
n
tai
n
in
g
a
r
esil
ie
n
t
n
et
w
o
r
k
s
u
f
f
er
in
g
f
r
o
m
v
er
y
lo
w
p
a
ck
et
d
r
o
p
d
u
e
to
Sy
n
-
Flo
o
d
attac
k
co
n
d
itio
n
i
n
a
n
et
w
o
r
k
h
av
i
n
g
m
u
lt
ip
le
n
o
d
es su
p
p
o
r
tin
g
m
u
lt
ip
le
n
u
m
b
er
o
f
Ag
e
n
ts
.
Fig
u
r
e
7
.
No
r
m
alize
d
R
o
u
ti
n
g
Ov
er
lo
ad
f
o
r
th
e
Scaled
Net
w
o
r
k
Fig
u
r
e
8
.
Ov
e
r
all
P
ac
k
ets d
r
o
p
p
ed
in
an
attac
k
co
n
d
itio
n
5.
CO
NCLU
SI
O
N
I
n
t
h
e
p
r
esen
t
s
t
u
d
y
w
e
h
av
e
d
is
cu
s
s
ed
r
eg
ar
d
i
n
g
th
e
S
y
n
-
Flo
o
d
A
ttac
k
a
n
d
h
o
w
d
r
o
p
p
in
g
o
r
a
f
ail
u
r
e
o
f
a
g
en
ts
d
u
e
to
h
ea
v
y
n
et
w
o
r
k
tr
a
f
f
ic
i
s
a
h
ea
v
y
lo
s
s
in
c
u
r
r
ed
u
p
o
n
t
h
e
n
o
d
es
as
w
ell
as
t
h
e
n
et
w
o
r
k
m
ed
iu
m
a
s
a
w
h
o
le
.
T
h
er
ea
f
te
r
w
e
h
a
v
e
p
r
o
p
o
s
ed
a
m
o
d
el
t
h
at
w
o
u
ld
d
etec
t t
h
e
s
y
n
-
f
lo
o
d
attac
k
in
th
e
b
u
f
f
er
its
el
f
s
a
v
in
g
t
h
e
en
er
g
y
w
a
s
t
ag
e
in
p
r
o
ce
s
s
i
n
g
o
f
s
u
c
h
m
e
s
s
a
g
es
as
w
el
l
as
g
e
n
er
ati
n
g
o
p
tim
a
l
n
u
m
b
er
o
f
ag
en
t
s
s
o
as
to
k
ee
p
t
h
e
n
et
w
o
r
k
m
ed
iu
m
tr
a
f
f
ic
lo
w
.
T
h
e
m
o
d
el
also
m
ai
n
tai
n
s
a
r
o
b
u
s
t
co
m
m
u
n
icatio
n
m
ed
iu
m
w
h
ile
id
en
ti
f
y
in
g
an
d
b
lo
ck
in
g
r
o
u
tes
t
h
r
o
u
g
h
t
h
e
m
alicio
u
s
n
o
d
e.
Fu
r
t
h
er
a
s
tu
d
y
o
n
th
e
b
eh
a
v
io
r
o
f
th
e
ag
e
n
t
s
lau
n
c
h
ed
in
to
th
e
n
et
w
o
r
k
h
as
b
ee
n
co
n
d
u
cted
w
h
ic
h
p
r
o
v
id
es
u
s
w
i
th
a
p
a
r
ito
o
p
tim
al
n
u
m
b
er
g
iv
in
g
u
s
th
e
m
o
s
t
b
en
e
f
icial
n
u
m
b
er
o
f
ag
e
n
t
s
to
b
e
lau
n
ch
ed
.
T
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
o
f
th
e
m
o
d
el
h
a
s
b
ee
n
test
ed
ac
r
o
s
s
N
S2
m
ed
i
u
m
th
a
t
g
a
v
e
u
s
t
h
e
r
ed
u
ce
d
n
u
m
b
er
o
f
d
r
o
p
o
f
p
ac
k
ets
b
y
7
4
%
an
d
i
m
p
r
o
v
ed
NR
L
o
f
t
h
e
n
et
w
o
r
k
.
t
h
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
,
h
a
s
s
h
o
w
n
a
n
in
cr
ea
s
e
i
n
n
u
m
b
er
o
f
S
y
n
-
Flo
o
d
attac
k
d
etec
tio
n
b
y
3
7
% a
lo
n
g
w
it
h
i
n
cr
ea
s
e
in
r
ate
o
f
tr
u
e
p
o
s
itiv
e
alar
m
s
g
e
n
er
ated
in
t
h
e
n
o
d
e.
REFEREN
CES
[1
]
T.
Nish
it
h
a
a
n
d
P
.
C
.
Re
d
d
y
,
“
P
e
rf
o
r
m
a
n
c
e
Ev
a
lu
a
ti
o
n
o
f
A
n
tHo
c
Ne
t
Ro
u
ti
n
g
A
lg
o
rit
h
m
in
A
d
Ho
c
Ne
tw
o
rk
s
,
”
IEE
E
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Co
m
p
u
ti
n
g
S
c
ien
c
e
s
,
p
p
.
2
0
7
-
2
1
1
,
2
0
1
2
.
[2
]
Z.
F
u
tai,
e
t
a
l.
,
“
M
u
l
ti
-
a
g
e
n
t
c
o
o
p
e
ra
ti
v
e
in
tru
sio
n
re
sp
o
n
se
in
m
o
b
il
e
a
d
h
o
c
n
e
tw
o
rk
s
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
En
g
i
n
e
e
rin
g
a
n
d
T
e
c
h
n
o
lo
g
y
(
IJ
E
T
)
,
v
ol
/i
ss
u
e
:
4
(
6
),
2
0
1
3
.
[3
]
P
.
Bra
u
n
a
n
d
W
.
Ro
ss
a
k
,
“
M
o
b
i
le A
g
e
n
ts
,
”
El
se
v
ier
,
2
0
0
5
.
[4
]
C
.
Ch
o
w
d
h
u
ry
a
n
d
S
.
Ne
o
g
y
,
“
Esti
m
a
ti
n
g
R
e
li
a
b
il
it
y
o
f
M
o
b
il
e
Ag
e
n
t
S
y
ste
m
f
o
r
M
o
b
il
e
A
d
h
o
c
Ne
tw
o
rk
s
,
”
IEE
E
-
Co
m
p
u
ter
S
o
c
iety
,
2
0
1
0
.
[5
]
H.
M
a
tsu
o
a
n
d
K.
M
o
ri,
“
A
c
c
e
l
e
ra
ted
A
n
ts
Ro
u
ti
n
g
in
Dy
n
a
m
i
c
Ne
t
w
o
rk
s,”
in
Pro
c
.
In
tl
.
Co
n
f.
o
n
S
o
ft
w
a
re
En
g
i
n
e
e
rin
g
,
Arti
fi
c
i
a
l
I
n
telli
g
e
n
c
e
,
Ne
two
rk
in
g
a
n
d
P
a
re
ll
e
l/
Distri
b
u
ted
Co
mp
u
ti
n
g
,
p
p
.
3
3
3
-
3
3
9
,
2
0
0
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
S
ec
u
r
ity
Mea
s
u
r
e
to
Dete
ct
a
n
d
A
vo
id
F
l
o
o
d
in
g
A
tta
ck
s
Usi
n
g
Mu
lti A
g
en
t
S
ystem
.
.
.
.
(
B
a
n
d
a
n
a
Ma
h
a
p
a
tr
a
)
925
[6
]
Y
.
T
o
k
g
o
z
a
n
d
A
.
A
c
a
m
p
o
ra
,
“
Im
p
ro
v
in
g
Co
n
n
e
c
ti
v
it
y
a
n
d
P
o
w
e
r
Eff
ici
e
n
c
y
in
W
irele
ss
A
d
Ho
c
Ne
t
w
o
rk
s
T
h
ro
u
g
h
A
g
e
n
t
No
d
e
s
,
”
IEE
E
,
2
0
0
5
.
[7
]
K.
F
a
ll
a
n
d
K
.
V
a
r
d
h
a
n
a
n
,
“
T
h
e
n
s
m
a
n
u
a
l
,”
T
h
e
V
INT
P
ro
jec
t,
UC
Be
rk
le
y
,
L
B
L
,
USC/
IS
I
a
n
d
X
ERO
X
P
A
RC,
2
0
0
1
.
h
tt
p
:/
/w
ww
.
isi.
e
d
u
/n
sn
a
m
/n
s/n
sd
o
c
u
m
e
n
tatio
n
.
h
tm
l
[8
]
R
.
R
.
C
h
o
u
d
h
u
ry
,
e
t
a
l.
,
“
A
Distr
ib
u
te
d
M
e
c
h
a
n
ism
f
o
r
T
o
p
o
lo
g
y
Disc
o
v
e
r
y
in
A
d
Ho
c
W
irele
ss
N
e
tw
o
rk
s
Us
in
g
M
o
b
i
le A
g
e
n
ts
,
”
IEE
E
,
p
p
.
1
4
5
-
1
4
6
,
2
0
0
0
.
[9
]
B
.
Ka
n
n
h
o
v
o
n
g
,
e
t
a
l
.
,
“
A
S
u
rv
e
y
o
f
Ro
u
ti
n
g
A
tt
a
c
k
s
i
n
M
o
b
il
e
A
d
Ho
c
Ne
tw
o
rk
s
,
”
IEE
E
W
ire
les
s
Co
mm
u
n
ica
ti
o
n
s
,
2
0
0
7
.
[1
0
]
P
.
Yi,
e
t
a
l.
,
“
A
Ne
w
Ro
u
ti
n
g
A
tt
a
c
k
in
M
o
b
il
e
A
d
Ho
c
N
e
tw
o
rk
s
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
,
v
ol
/i
ss
u
e
:
11
(
2
).
[1
1
]
M
.
P
a
tel,
e
t
a
l.
,
“
De
tec
ti
o
n
a
n
d
Pre
v
e
n
ti
o
n
o
f
Fl
o
o
d
in
g
At
t
a
c
k
Us
in
g
S
VM
,
”
In
ter
n
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
Co
m
m
u
n
ica
ti
o
n
S
y
ste
m
s an
d
Ne
tw
o
rk
T
e
c
h
n
o
lo
g
ies
(CS
NT
),
2
0
1
3
.
[1
2
]
D.
M
il
o
ji
c
k
,
“
M
o
b
il
e
A
g
e
n
t
A
p
p
li
c
a
ti
o
n
s,
”
IEE
E
c
o
n
c
u
rr
e
n
c
y
, p
p.
80
-
9
0
,
1
9
9
9
.
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
M
s.
B
a
n
d
a
n
a
M
a
h
a
p
a
t
r
a
is
As
st.
P
ro
f
e
ss
o
r
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
E
n
g
in
e
e
rin
g
a
t
S
OA
Un
iv
e
rsit
y
,
Bh
u
b
a
n
e
sw
a
r,
In
d
ia
s
in
c
e
2
0
0
8
.
He
r
re
se
a
rc
h
in
tere
st
i
s
S
e
c
u
rit
y
in
A
d
Ho
c
Ne
t
w
o
rk
a
n
d
A
rti
f
icia
l
In
telli
g
e
n
c
e
.
H
e
r
c
o
n
tri
b
u
t
io
n
a
lso
in
c
l
u
d
e
s
o
t
h
e
r
i
ss
u
e
s
in
A
d
h
o
c
Ne
tw
o
rk
li
k
e
e
ff
i
c
i
e
n
t
p
o
w
e
r
m
a
n
a
g
e
m
e
n
t
o
r
se
a
rc
h
in
g
sh
o
rtes
t
p
a
t
h
f
o
r
c
o
m
m
u
n
ica
ti
o
n
u
sin
g
a
rti
f
icia
l
in
telli
g
e
n
c
e
.
S
h
e
is
c
u
rre
n
tl
y
p
u
rs
u
in
g
h
e
r
P
h
D
u
n
d
e
r
S
OA
Un
iv
e
rs
it
y
,
Bh
u
b
a
n
e
sw
a
r.
Dr
.
S
r
i
k
a
n
t
a
Pa
t
n
a
i
k
is
a
P
ro
f
e
ss
o
r
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
E
n
g
in
e
e
rin
g
a
t
S
OA
Un
iv
e
rsit
y
,
Bh
u
b
a
n
e
sw
a
r,
In
d
ia.
His
re
se
a
rc
h
in
tere
st
is
i
n
M
a
c
h
i
n
e
In
tell
ig
e
n
c
e
a
n
d
Ro
b
o
ti
c
s,
a
n
d
h
e
h
a
s
p
u
b
li
sh
e
d
m
o
re
th
a
n
1
0
0
tec
h
n
ic
a
l
p
a
p
e
rs
in
th
e
in
tern
a
ti
o
n
a
l
jo
u
r
n
a
ls
a
n
d
m
a
g
a
z
in
e
s
o
f
r
e
p
u
te.
His
n
a
m
e
h
a
s
b
e
e
n
p
lac
e
d
in
th
e
M
A
RQU
IS
W
h
o
‟s
W
h
o
in
t
h
e
W
o
rld
f
o
r
th
e
2
0
0
4
a
n
d
h
e
w
a
s
a
lso
n
a
m
e
d
a
s
th
e
In
tern
a
ti
o
n
a
l
Ed
u
c
a
to
r
o
f
th
e
Ye
a
r
2
0
0
5
,
b
y
In
tern
a
ti
o
n
a
l
Bio
g
ra
p
h
ica
l
Ce
n
tre
in
G
re
a
t
Brit
a
in
.
He
is
t
h
e
E
d
it
o
r
-
in
-
C
h
ief
o
f
th
e
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
In
f
o
rm
a
ti
o
n
a
n
d
Co
mm
u
n
ica
ti
o
n
T
e
c
h
n
o
lo
g
y
,
a
n
d
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
t
a
ti
o
n
Vi
sio
n
a
n
d
Ro
b
o
t
ics
,
a
s
w
e
ll
a
s
P
re
sid
e
n
t
a
n
d
Ch
ief
M
e
n
to
r
o
f
In
ters
c
ien
c
e
R
e
se
a
r
c
h
Ne
tw
o
rk
(IRNe
t),
w
h
ich
is
a
p
ro
f
e
ss
io
n
a
l
b
o
d
y
to
e
n
c
o
u
ra
g
e
re
se
a
rc
h
e
rs an
d
sc
h
o
lar
s to
e
n
h
a
n
c
e
th
e
ir
re
se
a
rc
h
th
r
o
u
g
h
p
u
t
.
Evaluation Warning : The document was created with Spire.PDF for Python.