PERFORMANCE EVALUATION FOR DETECTION OF MALICIOUS NODES USING SVM IN MANET
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 8
Abstract
Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table defined by the user. Reactive protocols are on-demand routing protocols that defines the routing table on time for data transmission. This protocol selects the shortest path for data transmission. Two prevalent on-demand routing protocols which are ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) protocol are used previously. AODV is constructed based on DSDV routing. In AODV, each node only records the next hop information in its routing table but maintains it for sustaining a routing path from source to destination node. The source node is informed by a route error (RRER) packet first.
Authors and Affiliations
Inderpreet Kaur
A Review on Various Techniques of Machine Translation
Machine translation is a very crucial field of (NLP).It plays a very important role in language processing. It can translate one natural language into another natural language . Due to Globalization Language trans...
CONTRIBUTION OF POLYPROPYLENE FIBERS IN MODIFICATION OF VG 30 BITUMINOUS MIX
Road transportation sector plays a pivotal role in accessing the growth of any country. In developing nations like India, where the traffic development and axle loading is developing at logarithmic scale, weakening of r...
Strategic Management Practices in the Construction Industry: A Result Study Based on SPSS Tool
Since the establishment of the first national strategic development plan in the early 1970s, the construction industry has played important role in terms of the economic, social and cultural development of India....
Scalable and Secured Personal Health Records Sharing in Cloud Computing
Government and insurance companies moves in to creating Personal health record (PHR) for health information exchange to lower the cost of healthcare, better medical care for the patient and reduced medical errors. PHR...
Fingerprint and GSM based Security System
The main purpose of this paper is to design and implement high security system. Security is a prime concern in our day-to-day life. Perhaps the most important application of accurate personal identification is s...