PERFORMANCE EVALUATION FOR DETECTION OF MALICIOUS NODES USING SVM IN MANET

Abstract

 Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table defined by the user. Reactive protocols are on-demand routing protocols that defines the routing table on time for data transmission. This protocol selects the shortest path for data transmission. Two prevalent on-demand routing protocols which are ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) protocol are used previously. AODV is constructed based on DSDV routing. In AODV, each node only records the next hop information in its routing table but maintains it for sustaining a routing path from source to destination node. The source node is informed by a route error (RRER) packet first.

Authors and Affiliations

Inderpreet Kaur

Keywords

Related Articles

 A Review on Various Techniques of Machine Translation

 Machine translation is a very crucial field of (NLP).It plays a very important role in language processing. It can translate one natural language into another natural language . Due to Globalization Language trans...

CONTRIBUTION OF POLYPROPYLENE FIBERS IN MODIFICATION OF VG 30 BITUMINOUS MIX

Road transportation sector plays a pivotal role in accessing the growth of any country. In developing nations like India, where the traffic development and axle loading is developing at logarithmic scale, weakening of r...

 Strategic Management Practices in the Construction Industry: A Result Study Based on SPSS Tool

 Since the establishment of the first national strategic development plan in the early 1970s, the construction industry has played important role in terms of the economic, social and cultural development of India....

Scalable and Secured Personal Health Records Sharing in Cloud Computing

Government and insurance companies moves in to creating Personal health record (PHR) for health information exchange to lower the cost of healthcare, better medical care for the patient and reduced medical errors. PHR...

 Fingerprint and GSM based Security System

 The main purpose of this paper is to design and implement high security system. Security is a prime concern in our day-to-day life. Perhaps the most important application of accurate personal identification is s...

Download PDF file
  • EP ID EP101665
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

Inderpreet Kaur (30).  PERFORMANCE EVALUATION FOR DETECTION OF MALICIOUS NODES USING SVM IN MANET. International Journal of Engineering Sciences & Research Technology, 5(8), 82-87. https://europub.co.uk/articles/-A-101665