Treatment of Reactive Routing Protocols Using Second Chance Based on Malicious behavior of Nodes in MANETS
-
Published:2018-02-12
Issue:2
Volume:6
Page:
-
ISSN:2224-2333
-
Container-title:Pakistan Journal of Engineering, Technology & Science
-
language:
-
Short-container-title:Pakistan Journal of Engineering, Technology & Science
Author:
Belgaum Muhammad Riyaz,Soomro Safee,Alansari Zainab,Alam Muhammad
Abstract
<p>Mobile nodes of various routing protocols in Mobile Ad hoc Networks follow different strategies in transmission and receiving of data. Security, packet delivery and routing overhead are important concerns for any protocol during designing them. The presence and absence of malicious nodes in the network affect a lot on the performance of the protocol. This research focused on the study of the threats, attacks and reasons for malicious behavior of nodes in the network for reactive routing protocols in MANETS. DSR and AODV are the two reactive routing protocols that considered the study to propose a second chance strategy to given to the nodes considering the reason for malicious behavior to improve the packet delivery ratio and reduce the routing overhead in the network. A simulative study has conducted using Ad hoc Simulator (ASIM) considering the DSR and AODV routing protocols in the presence of malicious nodes and in the absence of malicious nodes that showed, that the packet delivery ratio is low and routing overhead is high in the absence of malicious nodes. The second chance strategy proposed considers the reasons for malicious behavior and helps the node to be reintegrate in the network to improve the packet delivery ratio and reduce the routing overhead.</p>
Publisher
Institute of Business Management
Subject
Ocean Engineering
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Personalized Healthcare in the Era of E-Business 5.0;Advances in E-Business Research;2024-07-19
2. Secured Approach towards Reactive Routing Protocols Using Triple Factor in Mobile Ad Hoc Networks;Annals of Emerging Technologies in Computing;2019-04-01
3. Challenges of Internet of Things and Big Data Integration;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2018