Downloads: 101 | Views: 207
Research Paper | Software Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.9 / 10
Identification of Trusted Nodes in Mobile Adhoc Network
Jeemi Sinha, Chaitali Choudhary
Abstract: Mobile ad hoc network system (MANET), contain a network area with nodes. In a mobile ad hoc network system, each node has to rely on others to relay its data packets. Since most mobile nodes are typically constrained by power and computing resources, so some nodes may choose, not to cooperative by refusing to do so while still using the network to forward their packets. Most previous works focus on data forwarding. However, dropping control packets is a better strategy for the selfish nodes to avoid themselves from being asked to forward data packets and hence could conserve resources for their own use. In this paper, we present a new system to detect those selfish nodes and simulate result using NS2 tool. Each node is expected to contribute to the network on the continual basis within a time frame. Those which fail will undergo a test for their suspicious behaviour. In this paper we only present the review and propose system for selfish nodes detection using a NS2 tools. Currently we are working with following keyword for practical implementation of this paper.
Keywords: MANET, Misbehaving nodes, Trusted Nodes, Network Simulator 2, Adhoc network
Edition: Volume 3 Issue 12, December 2014
Pages: 2137 - 2141
Make Sure to Disable the Pop-Up Blocker of Web Browser