Performance Comparison of DSR and DSSR Protocols with and Without False Data Injection Attack Based on Two Fish Algorithm using Manet
Rajat1, Naveen Hemrajani2

1Rajat, CSE, JECRC University, Jaipur, India.
2Dr. Naveen Hemrajani, CSE, JECRC University, Jaipur, India.

Manuscript received on 02 June 2019 | Revised Manuscript received on 10 June 2019 | Manuscript published on 30 June 2019 | PP: 2926-2933 | Volume-8 Issue-8, June 2019 | Retrieval Number: H7295068819/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The arrangement of remote applications or conventions with regards to Mobile Ad-hoc Networks (MANETs) frequently requires a venture through a recreation stage. For the consequences of the re-enactment to be significant, it is very much essential to have a model which is based on test system that coordinates as intently as conceivable the truth. However, the distributed service provisioning over MANETs need sufficient assistance for the discovery of service and also invocation. Numerous existing protocols for service discovery have been proposed to be efficient for the wireless environment and are found to be focused mainly on infrastructure-based 1-hop ad hoc wireless networks. This proposed method demonstrates the performance comparison of DSR and DSSR protocol that has been dissected and identified and their simulation results are obtained based on the two fish algorithm using MANET. It is a decentralised network with most encouraging and quickly developing innovation which is the self-sorted out and also it is quickly conveyed system.
Keyword: DSR, DSSR, MANET, Attack.
Scope of the Article: Data Base Management System.