Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

Sumiti, Dr. Sumit Mittal

- In this work, a nearest neighbor analysis has been performed to detect the selfish nodes in the active path and to generate a secure path. The existing AODV protocol is modified and a new bit is taken to define the trustful status. If status is 1, then node is valid, otherwise the node is selfish node and no communication is performed over that node. As the communication is performed, each node is analyzed by its neighboring nodes and builds a trust table. The reply status is 0 (by default) as the successful replied is received by a node, the value in the table changed to 1. Now the protocol checks the shared table and identifies the reply status. If the reply status is greater than the threshold value, the node is taken as the valid node and communication over that node is performed. This work has been implemented using NS-2.29 simulator and results shows that this technique is able to detect almost 90 % selfish nodes in the active path.

Keywords: Manet, Selfish node attack, Nearest neighbor Analysis, Ns-2, AODV

Edition: Volume 4 Issue 3, March 2015

Pages: 1295 - 1298

Share this Article

How to Cite this Article?

Sumiti, Dr. Sumit Mittal, "Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152318, Volume 4 Issue 3, March 2015, 1295 - 1298

132 PDF Views | 102 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Manet'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'Ns-2'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1187 - 1192

Effect of Load and Threshold Variation on Performance of RED: Random Early Detection

Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1896 - 1902

HSR: A New Lightweight Hybrid Source Routing Protocol for Mobile Ad Hoc Networks

Varun Pandey, Somesh Dewangan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1408 - 1412

Simulation Study of VANET Routing Protocols on NS-2 and NS-3

Dipti Shastri, Ajay Lala

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1590 - 1592

A Review Paper on Performance of Routing Protocols in NS-2

Rozy Rana, Kanwal Preet Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1154 - 1158

Route Optimization using Membrane Computing in Opportunistic Network

Ritu, Manjot Kaur Sidhu

Share this Article

Similar Articles with Keyword 'AODV'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this Article
Top