Detection and Prevention of Selfish Node Attack in MANET
Abstract
Keywords: AODV, MANET, NS2
Full Text:
PDFReferences
Hinds A., Ngulube M., Zhu S., et al. A review of routing protocols for MobileAd-Hoc NETworks (MANET), IJIET. 2013; 3(1).
Gupta A.K., Sadawarti H., Verma A.K. Review of various routing protocols for MANETs, Int J Inform Electr Eng. 2011; 1(3).
Prasanna venkatesan T., Rajakumar P., Pitchaikkannu A. Overview of proactive routing protocols in MANET international conference on communication systems and network technologies, IEEE. 2014.
Nayyar A. Simulation based evaluation of reactive routing protocol for MANET international conference on advanced computing & communication technologies, IEEE. 2012.
Biradar S.R., Sarma H.D., Sarakar S.K., et al. Hybrid (day- night) routing protocol for mobile Ad-Hoc networks international conference on microwave theory and applications, IEEE. November 2008.
Sankareswary P., Suganthi R., Sumathi G. Impact of selfish nodes in multicast ad hoc on demand distance vector protocol international conference on wireless communication and sensor computing, IEEE. 2010.
Butty´an L., Hubaux J.-P. Enforcing service availability in mobile ad-hoc WAN 1st workshop on mobile ad hoc networking and computing, IEEE. 2000.
Zhang L., Sooriyabandara M., Fan Z. A simple and reliable credit-balanced incentive scheme for wireless ad-hoc networks, IEEE. 2011.
Hortelano J., Cano J.C., Calafate C.T., et al. Watchdog intrusion detection systems: are they feasible in MANETs? XXI Jornadas de Paralelismo. CEDI, Valencia, Spain, September 2010.
Marti S., Giuli T.J., Lai K., et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks international Conference on Mobile Computing and Networking. Boston, USA, 2000.
Balakrishnan K., Deng J., Varshney P.K. TWOACK: preventing selfishness in mobile ad hoc networks wireless communications and networking conference, IEEE. 2005.
Miranda H., Rodrigues L. Friends and foes: preventing selfishness in open mobile ad hoc networks international conference on distributed computing systems workshops, IEEE. 2003.
Buchegger S., Yves Le Boudec J. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Adhoc NeTworks) International Symposium on Mobile Ad Hoc Networking and Computing. Lausanne, Switzerland, 2002.
The Network Simulator, nshttp://www.isi.edu/nsnam/ns
DOI: https://doi.org/10.37628/jbcc.v2i1.293
Refbacks
- There are currently no refbacks.