ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

PERFORMANCE EVALUATION FOR DETECTION OF MALICIOUS NODES USING SVM IN MANET

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 8)

Publication Date:

Authors : ; ;

Page : 82-87

Keywords : Routing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table defined by the user. Reactive protocols are on-demand routing protocols that defines the routing table on time for data transmission. This protocol selects the shortest path for data transmission. Two prevalent on-demand routing protocols which are ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) protocol are used previously. AODV is constructed based on DSDV routing. In AODV, each node only records the next hop information in its routing table but maintains it for sustaining a routing path from source to destination node. The source node is informed by a route error (RRER) packet first.

Last modified: 2016-08-08 19:24:36