Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique
Sumiti, Dr. Sumit Mittal
- In this work, a nearest neighbor analysis has been performed to detect the selfish nodes in the active path and to generate a secure path. The existing AODV protocol is modified and a new bit is taken to define the trustful status. If status is 1, then node is valid, otherwise the node is selfish node and no communication is performed over that node. As the communication is performed, each node is analyzed by its neighboring nodes and builds a trust table. The reply status is 0 (by default) as the successful replied is received by a node, the value in the table changed to 1. Now the protocol checks the shared table and identifies the reply status. If the reply status is greater than the threshold value, the node is taken as the valid node and communication over that node is performed. This work has been implemented using NS-2.29 simulator and results shows that this technique is able to detect almost 90 % selfish nodes in the active path.
Keywords: Manet, Selfish node attack, Nearest neighbor Analysis, Ns-2, AODV
Edition: Volume 4 Issue 3, March 2015
Pages: 1295 - 1298
How to Cite this Article?
Sumiti, Dr. Sumit Mittal, "Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152318, Volume 4 Issue 3, March 2015, 1295 - 1298
132 PDF Views | 102 PDF Downloads
Similar Articles with Keyword 'Manet'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'Ns-2'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1187 - 1192Effect of Load and Threshold Variation on Performance of RED: Random Early Detection
Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1896 - 1902HSR: A New Lightweight Hybrid Source Routing Protocol for Mobile Ad Hoc Networks
Varun Pandey, Somesh Dewangan
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 1408 - 1412Simulation Study of VANET Routing Protocols on NS-2 and NS-3
Dipti Shastri, Ajay Lala
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1590 - 1592A Review Paper on Performance of Routing Protocols in NS-2
Rozy Rana, Kanwal Preet Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1154 - 1158Route Optimization using Membrane Computing in Opportunistic Network
Ritu, Manjot Kaur Sidhu
Similar Articles with Keyword 'AODV'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1742 - 1748A MANET Security Using Routing Methodology
Shirsty Chandel, Prof. Ashish Tiwari
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2674 - 2680Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack
Jagdish J. Rathod, Amit. M. Lathigara