Performance Evaluation for Detection of Malicious Nodes Using Svm in Manet
نویسنده
چکیده
DOI: 10.5281/zenodo.59957 ABSTRACT Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table defined by the user. Reactive protocols are on-demand routing protocols that defines the routing table on time for data transmission. This protocol selects the shortest path for data transmission. Two prevalent on-demand routing protocols which are ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) protocol are used previously. AODV is constructed based on DSDV routing. In AODV, each node only records the next hop information in its routing table but maintains it for sustaining a routing path from source to destination node. The source node is informed by a route error (RRER) packet first.
منابع مشابه
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملPerformance Evaluation of Comprehensive Node Acknowledgement (CNA) Based IDS in MANET
MANET is a infrastructure less network with dynamically changing topologies and random communicating node. Here the mobile nodes communicate directly to other nodes without any router and hence the desired functionalities are embedded to each node. As the network is made of mobile nodes with less hardware configurations and requirements than a router, thus routing and its protocols used here is...
متن کاملPerformance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
Mobile Ad hoc Network (MANET) is a significant concept of wireless networks which comprises of thousands of nodes that are mobile as well as autonomous and they do not requires any existing network infrastructure. The autonomous nodes can freely and randomly move within the network which can create temporary dynamic network and these networks can change their topology frequently. The security i...
متن کاملAnalytical Model and Performance Evaluation for the TRIDNT protocol
In Mobile ad-hoc networks, nodes must cooperate to achieve the routing functions. Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding the most efficient path. A Two node-disjoint Routes scheme for Isolating Dropper Node (TRIDNT) protocol has been proposed in [13]. The p...
متن کامل