java code on detection of selfish node in Mobile Adhoc Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
rethich
Active In SP
**

Posts: 2
Joined: Dec 2009
#1
22-12-2009, 08:59 AM


hai! plz
give any referce for the java code on detection of Seflish node in manets
Reply
rethich
Active In SP
**

Posts: 2
Joined: Dec 2009
#2
22-12-2009, 10:38 AM

plz help for java code on detection of routing misbehavior in manets
Reply
ajukrishnan
Moderator
*****

Posts: 213
Joined: Dec 2009
#3
22-12-2009, 07:56 PM

Abstract
Mobile Ad hoc NETworks (MANETs) are networks in which mobile routers are connected via wireless links forming dynamic topologies.They are self organizing and autonomous networks, consisting of mobile nodes that act as routers and collaborate with one another to form a network. A Monitor for Mobile ad Hoc networks (MMAN)can be a solution for dynamic assessment of individual node
cooperation in forwarding packets for their neighbors, which helps identify selfish and malicious nodes in a MANET.
Selfishness
Selfishnessis a behaviour where a node or a group of nodes in a
MANET refuses to forward their peersâ„¢ packets, could
significantly affect the performance of a MANET.
Solution
Behavior-based solutions have been proposed to
detect selfish or malicious behavior in the network which is an approach that tend to be suited to the self-organized nature
of a MANET as nodes evaluate the behavior of their
peers, share their evaluations, and dynamically adjust
their own behavior. When a particular node is a non-cooperative one,
all other members of the network avoid requesting or
providing services from and to the misbehaving or selfish
node.

Requirements:
This system require either
secure hardware or a tamper-proof software suite to be
installed on all network nodes.Besides, to monitor and
report misbehavior, nodes have to consume their
CPU power,battery, and bandwidth.
MMAN relies on multiple monitoring stations that
collaborate and combine information to maintain an
accurate and up-to-date view.Many Monitoring Units (MUs) are deployed
throughout the MANET which are responsible for
collecting information regarding network behavior.The
information collected by the MUs is delivered to
management nodes, where they are analyzed and presented on a GUI. With MMAN, detecting selfishness is very robust
under high-volume traffic.

Detailed seminar and presentation report download:

.pdf   MANET- selfishness detedction.pdf (Size: 420 KB / Downloads: 399)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#4
29-10-2010, 03:40 PM


.ppt   SecQos2005_0095_DDjenouri.ppt (Size: 438 KB / Downloads: 90)

New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks


Djamel Djenouri: Basic Software Laboratory, CERIST Center of Research, Algiers, Algeria

Nadjib Badache: Computer Science Department, USTHB University, Algiers, Algeria.


Watchdog’s principles

Based on the promiscuous mode monitoring and implemented with a source routing protocol.
When a node Na sends a packet to Nb to forward to Nc, it monitors it by simply overhearing the channel, it validates the forwarding iff it overhears the packet retransmitted by Nb.
This process is generated for each couple of hops in the route


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  advantages and disadvantages of mobile phone cloning ppt Guest 1 71 31-10-2016, 03:28 PM
Last Post: Dhanabhagya
  ecg signal denoising using median filter matlab code Guest 1 61 31-10-2016, 03:03 PM
Last Post: amrutha735
  matlab code for lms algorithm based ecg denoising Guest 1 52 31-10-2016, 03:00 PM
Last Post: Dhanabhagya
  literature survey on project fire detection and monitoring system for railways Guest 1 86 31-10-2016, 02:51 PM
Last Post: jaseela123
  graphical password authentication source code download in swing Guest 1 131 31-10-2016, 02:39 PM
Last Post: amrutha735
  java code to implement salami attack Guest 1 74 31-10-2016, 02:30 PM
Last Post: jaseela123
  airline reservation system mini project in dbms with source code Guest 1 68 31-10-2016, 02:24 PM
Last Post: jaseela123
  matlab code for a generalized unsharp masking algorithm Guest 1 94 31-10-2016, 02:21 PM
Last Post: jaseela123
  64 bit ling adder verilog code Guest 1 59 31-10-2016, 01:12 PM
Last Post: amrutha735
  verilog code for implementation of 16 bit spanning tree carry look ahead adder Guest 1 45 31-10-2016, 01:06 PM
Last Post: amrutha735