International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 110 | Views: 189

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Rating: 6.3 / 10

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod | Sherly Noel

Abstract: A mobile ad-hoc network is an autonomous collection of the mobile nodes communicating each other with the help of wireless links either a direct or indirect manner. In a MANET (Mobile Ad-Hoc Network) we assume that all the nodes which are transmitting data are fully cooperative in nature. Due to the availability of low cost devices, open medium, wide distribution of nodes, changing topology, no centralized monitoring and its ability to provide instant wireless networking capabilities MANET is vulnerable to malicious attacks and it-s a topic worth research. So security of data and identifying the misbehaving node is indeed. To overcome we propose a technique which is combination of two PDA (Prevention and detection of algorithm) and Enhanced 2ACK scheme. The nodes are cooperative in nature to forward the packets to destination in a MANET network. Selfish node will not forward the packet to neighboring nodes so it will reduce the performance of a network and loss of data. In a PDA algorithm we use a trust function which collects the trust function from the neighboring node when it detects dropping of packets. After collecting trust function we will call Enhanced 2ACK scheme which will send 2hop acknowledgement to other sender node. Based on both the techniques cluster head will decide the behavior of a node and will generate the global alarm. For routing we use an AODV (Ad-hoc on demand protocol) protoco

Keywords: Mobile ad hoc network MANET, Misbehaving Node, Prevention and detection algorithm PDA, Enhanced 2ACK, Ad hoc on demand protocol AODV

Edition: Volume 4 Issue 5, May 2015,

Pages: 2550 - 2556

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait