2015
DOI: 10.5120/cae2015651951
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Routing by Excluding Selfish Nodes for MANET

Abstract: The Mobile nodes in MANET's are free to move randomly. Therefore, the network topology may change rapidly. Routing protocols for MANET are used for delivery of data packets from source to the desired destination. Routing protocols AODV are also designed based on the assumption that all the participating nodes are fully cooperative. However, due to the scarcity of available battery, node misbehaviors may exist. One such routing misbehaviors is that some nodes may be selfish as they take assistance of other node… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…It is proved that TBUT is predominant in enhancing the network performance and improving the security of most of the real applications. Smitha et al [15] proposed a selfish node detection algorithm called SIAODV for quantifying the degree of risk incurred for estimating the optimum path incurred in packet forwarding. SIAODV focuses only on the minimum risk path in packet dissemination rather than shortest path of routing which is predominantly used in most of the existing mitigation approaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is proved that TBUT is predominant in enhancing the network performance and improving the security of most of the real applications. Smitha et al [15] proposed a selfish node detection algorithm called SIAODV for quantifying the degree of risk incurred for estimating the optimum path incurred in packet forwarding. SIAODV focuses only on the minimum risk path in packet dissemination rather than shortest path of routing which is predominantly used in most of the existing mitigation approaches.…”
Section: Literature Reviewmentioning
confidence: 99%