Downloads: 112 | Views: 251
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.7 / 10
Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique
Sumiti, Dr. Sumit Mittal
Abstract: - In this work, a nearest neighbor analysis has been performed to detect the selfish nodes in the active path and to generate a secure path. The existing AODV protocol is modified and a new bit is taken to define the trustful status. If status is 1, then node is valid, otherwise the node is selfish node and no communication is performed over that node. As the communication is performed, each node is analyzed by its neighboring nodes and builds a trust table. The reply status is 0 (by default) as the successful replied is received by a node, the value in the table changed to 1. Now the protocol checks the shared table and identifies the reply status. If the reply status is greater than the threshold value, the node is taken as the valid node and communication over that node is performed. This work has been implemented using NS-2.29 simulator and results shows that this technique is able to detect almost 90 % selfish nodes in the active path.
Keywords: Manet, Selfish node attack, Nearest neighbor Analysis, Ns-2, AODV
Edition: Volume 4 Issue 3, March 2015
Pages: 1295 - 1298
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Downloads: 3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024
Pages: 736 - 741Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks
Dr. J. Seetaram, Dr. M. Nagaraju Naik
Downloads: 80
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Downloads: 86
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar