Indian Journal of Science and Technology
Year: 2011, Volume: 4, Issue: 10, Pages: 1340-1346
S.Usha1 and S. Radha2*
This paper depicts a model which not only evaluates the node’s reputation, but also avoids the malicious node in the forwarding path. The simulation is performed by using the NS2 software. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signalling at the MAC layer. The paper models packet forwarding, passive misbehavior, active misbehavior and avoidance of malicious nodes in the route. The model also takes into account the blocking caused by the hidden node problem in wireless networks. The results achieved are both graphical as well as in the form of a network animation. Curves such as throughput and jitter are plotted to analyse the performance of the MANET.
Keywords: RTS, CTS,Clone Node, Jitter , Throughput
Subscribe now for latest articles and news.