Abstract

This paper depicts a model which not only evaluates the node's reputation, but also avoids the malicious node in the forwarding path. The simulation is performed by using the NS2 software. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signalling at the MAC layer. The paper models packet forwarding, passive misbehavior, active misbehavior and avoidance of malicious nodes in the route. The model also takes into account the blocking caused by the hidden node problem in wireless networks. The results achieved are both graphical as well as in the form of a network animation. Curves such as throughput and jitter are plotted to analyse the performance of the MANET.

Highlights

  • Network security is a challenging aspect in MobileAd hoc Networks (MANETS)

  • The MANETs suffer from various attacks and threats such as misbehavior and clone nodes

  • This paper models and studies the impact of misbehavior and clone nodes and proposes a solution to avoid the potential malicious nodes

Read more

Summary

Introduction

Network security is a challenging aspect in MobileAd hoc Networks (MANETS). The MANETs suffer from various attacks and threats such as misbehavior and clone nodes. This paper models and studies the impact of misbehavior (active and passive) and clone nodes and proposes a solution to avoid the potential malicious nodes. The paper incorporates a cross layer approach to the AODV protocol.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.