An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs
#1

[attachment=5204]
An Acknowledgment-based Approach for the
Detection of Routing Misbehavior in MANETs



Abstract

We study routing misbehavior in MANETs (Mobile Ad Hoc Networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some sel sh nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: misbehavior, detection of routing misbehaviour in manets, source code in java for detection of routing misbheviour in manets, acknoledgement based approach for routing misbehavior in manet, multicast routing for manets seminar, acknowledgment of underwater welding seminar report, eack a secure instrusion detection system for manets ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  OBJECT TRACKING AND DETECTION full report project topics 9 31,243 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,405 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,122 15-04-2016, 08:04 PM
Last Post: knagpur
  GREEN CLOUD -A Data Center Approach computer topic 0 1,543 25-03-2014, 10:13 PM
Last Post: computer topic
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,364 22-07-2013, 11:44 AM
Last Post: computer topic
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,764 01-03-2013, 11:58 AM
Last Post: [email protected]
  SEMINAR REPORT on Adaptive Routing in Adhoc Networks Computer Science Clay 2 4,950 02-01-2013, 10:25 AM
Last Post: seminar details
  AN EXTENDED ZONE ROUTING PROTOCOL FOR SERVICE DISCOVERY IN MOBILE AD HOC NETWORKS seminar presentation 1 9,336 24-12-2012, 12:47 PM
Last Post: seminar details
  Enhanced QoS Multicast Routing Protocol nit_cal 1 5,730 20-12-2012, 10:31 AM
Last Post: seminar details

Forum Jump: