Identification of Malicious Nodes & Paths to Reduce Packet Loss in Mobile ADHOC Network with NS2 Simulator
P. Haritha1, R. Puviarasi2

1P. Haritha, Department of Electronics and Communication Engineering, Saveetha School of Engineering, Saveetha Institute of  Medical  and  Technical Sciences, Chennai, (Tmil nadu),  India.

2Dr. R. Puviarasi, Department of  Electronics and Communication Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, (Tmil nadu),  India.

Manuscript received on 20  August 2019 | Revised Manuscript received on 27 August 2019 | Manuscript Published on 31 August 2019 | PP: 358-360 | Volume-8 Issue-9S2 August 2019 | Retrieval Number: I10770789S219/19©BEIESP DOI: 10.35940/ijitee.I1077.0789S219

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: System security assumes a vital job in this MANET and the customary method for ensuring the systems through firewalls and encryption programming is never again powerful and adequate. So as to give extra security to the MANET, interruption location components ought to be included. In this paper, particular affirmation is utilized for distinguishing vindictive hubs in the specially appointed system. NS2 is utilized to recreate and assess the proposed plan and look at it against the AACK. The acquired outcomes demonstrate that the specific affirmation conspire outflanks AACK as far as system bundle conveyance proportion and directing overhead. Portable Ad-hoc Network is an impermanent system made out of versatile hubs, associated by remote connections, without settled infrastructure. This paper proposes a novel component considered specific affirmation for taking care of issues that emerge with Adaptive Acknowledgment (AACK). Points of interest in this paper are security is expanded and can enhance the execution of the system.

Keywords: AODV, MANET, Malicious node, Security.
Scope of the Article: IoT Application and Communication Protocol