PERFORMANCE EVALUATION FOR DETECTION OF MALICIOUS NODES USING SVM IN MANET

Abstract

 Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table defined by the user. Reactive protocols are on-demand routing protocols that defines the routing table on time for data transmission. This protocol selects the shortest path for data transmission. Two prevalent on-demand routing protocols which are ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) protocol are used previously. AODV is constructed based on DSDV routing. In AODV, each node only records the next hop information in its routing table but maintains it for sustaining a routing path from source to destination node. The source node is informed by a route error (RRER) packet first.

Authors and Affiliations

Inderpreet Kaur

Keywords

Related Articles

Wireless Hotspots: Current Challenges and Future Directions For Next Generation Hotspot

In this work, we study the effects of hotspots in wireless cellular networks. In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providi...

 DESIGN AND FABRICATION OF THERMAL CONDUCTIVITY APPARATUS FOR CASHEW NUT

 Experiments were conducted for determination of various physical properties of Vengurla-4 variety of cashew nut. The diameter or size and sphericity of cashew nut were found to be 21.92 mm and 0.68 respectivel...

 Removal of Heavy Metal Ions from Wastewater by Carbon Nanotubes (CNTs)

 Advent of nanotechnology has introduced us with new generation of adsorbents such as carbon nanotubes (CNTs) which have aroused widespread attention due to their outstanding ability for the removal of various ino...

GLITCH-FREE NAND-BASED DIGITALLY CONTROLLED DELAY LINES

Glitch is an undesired transition that occurs before the signal settles to its intended value. It is an electrical pulse of short duration that is usually the result of a fault or design error, particularly in a digital...

 Characterization and Modifications in Watermelons (Citrullus Lanatus) cv Fashion, after the Application of Saline Waters

 Quality and characteristics of watermelon (cv. Fashion) were studied and compared with different salinity conditions (ah cultivated in greenhouses with Mediterranean climate). Different parameters were measured du...

Download PDF file
  • EP ID EP101665
  • DOI -
  • Views 70
  • Downloads 0

How To Cite

Inderpreet Kaur (30).  PERFORMANCE EVALUATION FOR DETECTION OF MALICIOUS NODES USING SVM IN MANET. International Journal of Engineering Sciences & Research Technology, 5(8), 82-87. https://europub.co.uk/articles/-A-101665