An Enhanced AODV Routing Protocol to detect and isolate selfish nodes in Manets
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 2
Abstract
The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehaviour a node may exhibit is selfishness. A selfish node is a node which avoids the forwarding activity due to its current low power status or it feels so over utilized in the forwarding activity and fears that it will drain so much power that it will not have enough energy to send or receive its own packets in the future. This selfish behaviour problem is quite common in ad hoc networks. One way of preventing selfishness in a MANET is a detection and exclusion mechanism. In this paper, we have proposed an Enhanced AODV routing protocol to detect and isolate selfish nodes from the network in MANETs. The strategy assumes that the selfish nodes are not malicious and obligated to speak truth about their current energy level.[20]S. Corson, and J. Macker, Mobile Ad hoc Networking: “Routing Protocol Performance Issues and Evaluation Consideration” rfc 2501, jan 2003.
Authors and Affiliations
Yogesh Bansal
Urgent Data Transmission in Wireless Sensor Network
Paper wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building...
Regression and Classification Model Based Predictive Maintenance of Aircrafts Using Neural Network
One of the key objectives of today's businesses and mills is to predict machine problems. Failures must be avoided, because downtimes represent expensive expenses and a loss of productivity. This is why the number of rem...
The Efficient Design for Error Correction in Fault Tolerant Adder Using Fpga
Fault tolerant systems play a significant role in many digital systems, especially those implemented utilizing Nano scale technologies, because of their vulnerability to electromagnetic interference and transient errors...
Educational Data Mining and Data Warehouse Design Using Business Intelligence
Business intelligence (BI) is basically a collection of programs, utilities and apps that allows you to analyze large quantities of data (Big Data). Every year, educational institutions deal with enormous amounts of Big...
Multilevel Inverter Based Active Power Filter With Energy Balanced DC Link Capacitor
This paper presents the modeling of a multilevel cascaded H-bridge inverter for a three phase shunt active power filter (APF). Multilevel-cascaded inverter can give better performance compared to other topologies. The DC...