Detection and Prevention of Selfish Nodes in Mobile Adhoc Networks

Authors(2) :-Avni Verma, Nitin Tiwari

A MANET is a remote system in which hubs can go about as sender/collector or even as delegates prefer switches. Hubs in a MANET may act up with an aim to preserve assets. This happens due to restricted assets accessible for every hub. This causes an incredible effect on the whole system execution. In this paper we examine about MANET as zones and groups with a Static Agent as a focal hub and a Zonal Agent for every zone. It is a change over Mobile Agent based building design which is made conceivable in light of the fact that by presenting Zonal Agents. In this way, the framework has the capacity distinguish Selfish and Malicious Nodes with lessened measure of data trade between the hubs furthermore talk about the approaches for better after-effects of self cantered hubs and grouping approaches for hub classification.

Authors and Affiliations

Avni Verma
Computer Science and Engineering Department, Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India
Nitin Tiwari
Computer Science and Engineering Department, Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India

MANET, Misbehaviour, Zonal Agent, Misbehaving Nodes

  1. Alokparna Bandyopadhyay, Satyanarayana Vuppala and Prasenjit Choudhury “A Simulation Analysis of Flooding Attack in MANET using NS-3”, Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Syst,, Feb. 28 2011-March 3 2011.
  2. Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks - A Survey”, the 17 Th White House Papers Graduate Research2004 Cite Seer.
  3. Casimir & Roland, “The Performance Of Dynamic Source Routing Protocol For Mobile Ad Hoc Networks”, Blekinge Institute of Technology September 2009.
  4. Luis Gironés Quesada, “A Routing Protocol for MANETs”, Norwegian University of Science and Technology, May 2007.
  5. Abedellatif Mohammed Hussein, "Flooding Control in Route Discovery for Reactive Routing in Mobile Ad Hoc Networks”, Kate Gleason College of Engineering Rochester Institute of Technology Rochester, NY May, 2007.
  6. C.E. Perkins, and E.M. Royer, “Ad-hoc On-demand Distance Vector Routing,” in: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp.90-100.
  7. Deepa.S and Dr. D.M Kadhar Nawaz,” A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns” IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010.
  8. Yoav Sasson, David Cavin, and Andre Schiper, ”Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks” Cite Seer Conference 2002.
  9. S. Kannan, T. Kalaikumaran, S. Karthik and V.P. Arunachalam, “A Review on Attack Prevention Methods in MANET” Journal of Modern Mathematics and Statistics Year: 2011 | Volume: 5 | Issue: 1 | Page No.: 37-42.
  10. Humaira Ehsan and Farrukh Aslam Khan, “Malicious AODV Implementation and Analysis of Routing Attacks in MANETs”, 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012.
  11. Ms. Arpita Raverkar, “Route Discovery in Insecure Mobile Ad hoc Network”, IEEE, 2011 978-1-4244-8679-3/11/.
  12. Abdur Rashid Sangi, Jianwei Liu and Likun Zou, “A Performance Analysis of AODV Routing Protocol under Combined Byzantine Attacks in MANETs”, IEEE, 2009978-1-4244-4507-3/09/.
  13. NS-3 simulator,

Publication Details

Published in : Volume 2 | Issue 1 | January-February 2016
Date of Publication : 2016-02-29
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 483-486
Manuscript Number : IJSRSET1621121
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Avni Verma, Nitin Tiwari , " Detection and Prevention of Selfish Nodes in Mobile Adhoc Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 1, pp.483-486, January-February-2016.
Journal URL :

Article Preview

Follow Us

Contact Us