|
Algorithm 3. Procedure C. Procedure (C): |
|
Input: Attacker access
Output: Attacker logs and report 1. Do for all attacker access over MAC frame sequence, Go to step 2. Go to step 3. 2. Call HBC and IVB functions (Procedure (D)) Create an alert to all neighbours, Make an entry in the attacker’s record, 3. Continue and 4. Do for all active channels, 5. Call procedure (A) and procedure (B) for activating each at |
| End of Procedure (C) |