Identification of Trusted Nodes in Mobile Adhoc Network
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)Publication Date: 2014-12-05
Authors : Jeemi Sinha; Chaitali Choudhary;
Page : 2137-2141
Keywords : MANET; Misbehaving nodes; Trusted Nodes; Network Simulator 2; Adhoc network;
Abstract
Mobile ad hoc network system (MANET), contain a network area with nodes. In a mobile ad hoc network system, each node has to rely on others to relay its data packets. Since most mobile nodes are typically constrained by power and computing resources, so some nodes may choose, not to cooperative by refusing to do so while still using the network to forward their packets. Most previous works focus on data forwarding. However, dropping control packets is a better strategy for the selfish nodes to avoid themselves from being asked to forward data packets and hence could conserve resources for their own use. In this paper, we present a new system to detect those selfish nodes and simulate result using NS2 tool. Each node is expected to contribute to the network on the continual basis within a time frame. Those which fail will undergo a test for their suspicious behaviour. In this paper we only present the review and propose system for selfish nodes detection using a NS2 tools. Currently we are working with following keyword for practical implementation of this paper.
Other Latest Articles
- Influence of Guidance and Counselling on Academic Performance of Students in Selected Public Secondary Schools in Molo Sub County, Nakuru County, Kenya
- A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique
- A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation
- Erection Trusted and Effective Request Services in the Cloud with RASP Data Perturbation
- Approach to Detect and Block DDOS Attack at Application Layer Using Novel Framework
Last modified: 2021-06-30 21:15:01