Skip to main content
. 2022 Oct 21;22(20):8046. doi: 10.3390/s22208046
Algorithm 3. Procedure C.
Procedure (C): WH:Frameevents
Input: Attacker access a(maci)
Output: Attacker logs and report
1. Do for all attacker access over MAC frame sequence, a(maci)
          If a(maci,IHFi)==TRUE):
            Go to step 2.
          If a(maci,IHFi)==FALSE):
            Go to step 3.
2. Call HBC and IVB functions (Procedure (D))
          Create an alert to all neighbours, nn
          Make an entry in the attacker’s record, A(rn)
3. Continue n(TXi) and n(RXi)
4. Do for all active channels, C(AXi)
5. Call procedure (A) and procedure (B) for activating each n(TXi) at C(AXi)
End of Procedure (C)