The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Backgrounds/Objectives: The main objective of this methodology is to reduce the packet loss in intermediate nodes by eliminating malicious nodes in the routing path. Causing packet drop due to attacks by malicious nodes is one of the most significant troubles in MANETs.

Methods/Statistical analysis: In Grayhole and Blackhole attack, the malicious nodes are deliberately disrupting data transmission in the network by sending incorrect routing information. It is a challenge to keep the communication route free from such attackers. The research is conducted to find the most considerable methodology that can detect the malicious nodes without degradation of network performance.

Findings: The various research works has been analysed and its performance is evaluated in terms of packet delivery ratio and End To End delay.

Application/Improvements: The findings of this work prove that the intrusion detection and adaptive response (IDAR) mechanism achieves better results than the other approaches in terms of packet delivery ratio and End To End delay.


Keywords

Black Hole Attack, Grayhole Attack, Manet, Malicious Node.
User
Notifications