Detecting Selfish node in MANET- A Review
Jagmeet Kaur1 , Prabhjit Singh2
Section:Review Paper, Product Type: Journal Paper
Volume-4 ,
Issue-5 , Page no. 99-104, May-2016
Online published on May 31, 2016
Copyright © Jagmeet Kaur , Prabhjit Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Jagmeet Kaur , Prabhjit Singh, “Detecting Selfish node in MANET- A Review,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.99-104, 2016.
MLA Style Citation: Jagmeet Kaur , Prabhjit Singh "Detecting Selfish node in MANET- A Review." International Journal of Computer Sciences and Engineering 4.5 (2016): 99-104.
APA Style Citation: Jagmeet Kaur , Prabhjit Singh, (2016). Detecting Selfish node in MANET- A Review. International Journal of Computer Sciences and Engineering, 4(5), 99-104.
BibTex Style Citation:
@article{Kaur_2016,
author = {Jagmeet Kaur , Prabhjit Singh},
title = {Detecting Selfish node in MANET- A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {4},
Issue = {5},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {99-104},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=912},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=912
TI - Detecting Selfish node in MANET- A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Jagmeet Kaur , Prabhjit Singh
PY - 2016
DA - 2016/05/31
PB - IJCSE, Indore, INDIA
SP - 99-104
IS - 5
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1662 | 1393 downloads | 1508 downloads |
Abstract
MANET (Mobile Ad-Hoc Network) is self-directed and infrastructure less network. MANETs contains mobile nodes that are free to move in the network. Nodes can be the devices like mobile phones, PDA, MP3 players and personal computers which are participating in network. MANET has the dynamic topology due to the node movement. Transmissions of the packet between the mobile devices are overcome by the Routing Protocol. Selfish node is a major problem in MANET. Selfish nodes are nodes that do not participate in forwarding process. This paper presents types of MANET protocols along with security issues that MANET faces. The major consideration of this paper is about the behavior and detection methods of selfish node in MANET.
Key-Words / Index Term
MANET, Routing Protocol, Security Principals
References
[1] Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014
[2] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9(4), pp (106-111), April 2011
[3] ayank Kumar and Tanya Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (71-75), Mar -2014
[4] M.Madhumathi, S. Sindhuja, “ A Survey on Collaborative contact-based Selfish node detection in Mobile ad hoc Network”, International Journal of Advanced Research in Computer Engineering & Technology, Volume 4 Issue 10, October 2015
[5] Nikunjkumar Varnagar, prof. Amit Lathigara, “Review Paper of Selfish Node Detection in MANET”, International Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 2, February 2015
[6] G.Satyavathy and P. Anitha, "A Collaborative Contact-Based Watchdog CoCoWa for Detecting Selfish Nodes with Trust Model", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (120-123), Sep -2015