Performance Evaluation for Detection of Malicious Nodes Using Svm in Manet

نویسنده

  • Inderpreet Kaur
چکیده

DOI: 10.5281/zenodo.59957 ABSTRACT Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table defined by the user. Reactive protocols are on-demand routing protocols that defines the routing table on time for data transmission. This protocol selects the shortest path for data transmission. Two prevalent on-demand routing protocols which are ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) protocol are used previously. AODV is constructed based on DSDV routing. In AODV, each node only records the next hop information in its routing table but maintains it for sustaining a routing path from source to destination node. The source node is informed by a route error (RRER) packet first.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

Performance Evaluation of Comprehensive Node Acknowledgement (CNA) Based IDS in MANET

MANET is a infrastructure less network with dynamically changing topologies and random communicating node. Here the mobile nodes communicate directly to other nodes without any router and hence the desired functionalities are embedded to each node. As the network is made of mobile nodes with less hardware configurations and requirements than a router, thus routing and its protocols used here is...

متن کامل

Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET

Mobile Ad hoc Network (MANET) is a significant concept of wireless networks which comprises of thousands of nodes that are mobile as well as autonomous and they do not requires any existing network infrastructure. The autonomous nodes can freely and randomly move within the network which can create temporary dynamic network and these networks can change their topology frequently. The security i...

متن کامل

Analytical Model and Performance Evaluation for the TRIDNT protocol

In Mobile ad-hoc networks, nodes must cooperate to achieve the routing functions. Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding the most efficient path. A Two node-disjoint Routes scheme for Isolating Dropper Node (TRIDNT) protocol has been proposed in [13]. The p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016