Abstract
AbstractThe communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge the gap between the source and the destination. All these selfless forwarding's require energy, bandwidth, and other resources. Therefore, some routers often raise a link breakage attack to save their resources. They keep silent after receiving a message; neither they acknowledge it nor they forward it. These selfish nodes must be identified and carefully avoided while choosing routes; otherwise, numerous messages will have to be resent, including control messages like route‐request. The identification depends on the past behavior of the node as well as velocity, the direction of movement, current geographical location and so forth. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. It also enhances the packet delivery ratio and reduces delay and energy consumption.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Transactions on Emerging Telecommunications Technologies
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.