International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015


Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

Sumiti | Dr. Sumit Mittal


Abstract: - In this work, a nearest neighbor analysis has been performed to detect the selfish nodes in the active path and to generate a secure path. The existing AODV protocol is modified and a new bit is taken to define the trustful status. If status is 1, then node is valid, otherwise the node is selfish node and no communication is performed over that node. As the communication is performed, each node is analyzed by its neighboring nodes and builds a trust table. The reply status is 0 (by default) as the successful replied is received by a node, the value in the table changed to 1. Now the protocol checks the shared table and identifies the reply status. If the reply status is greater than the threshold value, the node is taken as the valid node and communication over that node is performed. This work has been implemented using NS-2.29 simulator and results shows that this technique is able to detect almost 90 % selfish nodes in the active path.


Keywords: Manet, Selfish node attack, Nearest neighbor Analysis, Ns-2, AODV


Edition: Volume 4 Issue 3, March 2015,


Pages: 1295 - 1298


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sumiti, Dr. Sumit Mittal, "Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1295-1298, https://www.ijsr.net/get_abstract.php?paper_id=SUB152318

Similar Articles with Keyword 'Manet'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [28]

Share this Article
Top