adding selfish node to dsr in ns2
#1

how to add selfish node in dsr for ns2 simulator
Reply
#2

An ad hoc mobile network system (MANET) contains a network area with nodes. In an ad hoc mobile network system, each node must rely on others to retransmit its data packets. Since most mobile nodes are usually limited by power and computing resources, so some nodes may choose not to cooperate by refusing to do so while still using the network to forward their packets. Most of the previous work focuses on data forwarding. However, eliminating control packets is a better strategy for selfish nodes to avoid being asked to forward packets of data and so they can conserve resources for their own use. In this article, we present a new system for detecting selfish nodes and simulating results using the NS2 tool. Each node is expected to contribute to the network continuously within a time frame. Those who fail will undergo a test for their suspicious behavior. In this paper we present only the revision and proposal system for the detection of selfish nodes using NS2 tools. We are currently working with the following keyword for the practical implementation of this document.


An ad hoc mobile network system (MANET) contains a network area with nodes. In an ad hoc mobile network system, each node must rely on others to retransmit its data packets. Since most mobile nodes are usually limited by power and computing resources, so some nodes may choose not to cooperate by refusing to do so while still using the network to forward their packets. Most of the previous work focuses on data forwarding. However, eliminating control packets is a better strategy for selfish nodes to avoid being asked to forward packets of data and so they can conserve resources for their own use.  Each node is expected to contribute to the network continuously within a time frame. Those who fail will undergo a test for their suspicious behavior. In this paper we present only the revision and proposal system for the detection of selfish nodes using NS2 tools. We are currently working with the following keyword for the practical implementation of this document.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: selfish node in dsr routing protocol, ns2 code for selfish node detection, malicious node to dsr in ns2 code, ns2 source code for dsr, selfish node detection instruments, ns2 selfish node detection, adding malicious node to aodv ns2,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  why aggregates are heated to 170 degrees while adding plastic in road construction 2 1,114 19-10-2017, 12:22 PM
Last Post: jaseela123d
Sad wormhole attack is implemented in ns2 at the network layer 13 4,524 05-05-2017, 01:42 PM
Last Post: neeraj.kuntal90
  ns2 projects for wormhole attack detection with source code free download 8 6,357 15-04-2017, 04:31 PM
Last Post: Guest
  ns2 source code free download broadcast message 1 980 15-04-2017, 02:42 PM
Last Post: jaseela123d
  ant colony optimization ns2 code 1 957 15-04-2017, 01:27 PM
Last Post: jaseela123d
  sinkhole aodv implementation code in ns2 1 890 10-04-2017, 04:25 PM
Last Post: jaseela123d
  ns2 coding for clone node attack 1 757 04-04-2017, 10:04 AM
Last Post: jaseela123d
  load balancing using ns2 1 746 31-03-2017, 01:55 PM
Last Post: jaseela123d
  aco source code for ns2 1 747 30-03-2017, 12:17 PM
Last Post: jaseela123d
  source code for anycast algorithm on ns2 1 646 28-03-2017, 10:54 AM
Last Post: jaseela123d

Forum Jump: