Algorithm: Flooding_attack_protect (T_data, R_data, P, H, L)

Data: Transmitting data=T_data, Receiving data=R_data, Authorize bit=H, Unauthorized bit=L. Result: Flooding_attack=F_attack.

(1) Start

(2) Connection==Serial Communication(); /*Check serial communication between router and coordinator*/

(3) If connection==Fail

(4) Return Start; /*Step 1*/

(5) End

(6) If connection==True then

(7) T_data==Encrypt(data); /*AES 128 bit encryption*/

(8) If R_data==‘H’ OR ‘L’ then /*128 bit decryption*/

(9) Initialization I, data;

(10) Fori=1 to 20 do

(11) Data=data+1;

(12) Delay==200 ms;

(13) If Data>7

(14) F_Attack==Yes;

(15) Update Web(F_attack); /*Update web page with Flooding attack data*/

(16) Send Email(Admin); /*Send email to Admin notifying Flooding attack*/

(17) Return Start; /*Step 1*/

(18) End

(19) End

(20) End

(21) End