java code on detection of selfish node in Mobile Adhoc Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 2
Joined: Dec 2009
22-12-2009, 08:59 AM

hai! plz
give any referce for the java code on detection of Seflish node in manets
Active In SP

Posts: 2
Joined: Dec 2009
22-12-2009, 10:38 AM

plz help for java code on detection of routing misbehavior in manets

Posts: 213
Joined: Dec 2009
22-12-2009, 07:56 PM

Mobile Ad hoc NETworks (MANETs) are networks in which mobile routers are connected via wireless links forming dynamic topologies.They are self organizing and autonomous networks, consisting of mobile nodes that act as routers and collaborate with one another to form a network. A Monitor for Mobile ad Hoc networks (MMAN)can be a solution for dynamic assessment of individual node
cooperation in forwarding packets for their neighbors, which helps identify selfish and malicious nodes in a MANET.
Selfishnessis a behaviour where a node or a group of nodes in a
MANET refuses to forward their peersâ„¢ packets, could
significantly affect the performance of a MANET.
Behavior-based solutions have been proposed to
detect selfish or malicious behavior in the network which is an approach that tend to be suited to the self-organized nature
of a MANET as nodes evaluate the behavior of their
peers, share their evaluations, and dynamically adjust
their own behavior. When a particular node is a non-cooperative one,
all other members of the network avoid requesting or
providing services from and to the misbehaving or selfish

This system require either
secure hardware or a tamper-proof software suite to be
installed on all network nodes.Besides, to monitor and
report misbehavior, nodes have to consume their
CPU power,battery, and bandwidth.
MMAN relies on multiple monitoring stations that
collaborate and combine information to maintain an
accurate and up-to-date view.Many Monitoring Units (MUs) are deployed
throughout the MANET which are responsible for
collecting information regarding network behavior.The
information collected by the MUs is delivered to
management nodes, where they are analyzed and presented on a GUI. With MMAN, detecting selfishness is very robust
under high-volume traffic.

Detailed seminar and presentation report download:

.pdf   MANET- selfishness detedction.pdf (Size: 420 KB / Downloads: 398)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
29-10-2010, 03:40 PM

.ppt   SecQos2005_0095_DDjenouri.ppt (Size: 438 KB / Downloads: 89)

New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks

Djamel Djenouri: Basic Software Laboratory, CERIST Center of Research, Algiers, Algeria

Nadjib Badache: Computer Science Department, USTHB University, Algiers, Algeria.

Watchdog’s principles

Based on the promiscuous mode monitoring and implemented with a source routing protocol.
When a node Na sends a packet to Nb to forward to Nc, it monitors it by simply overhearing the channel, it validates the forwarding iff it overhears the packet retransmitted by Nb.
This process is generated for each couple of hops in the route


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: mobile ad hoc networking project in java, how to find mobile routers in mobile adhoc networks in java, code for detecting selfish node in network, selfish thread in java, secqos2005 0095 ddjenouri base paper, java code for mobile detection, detection of selfish nodes in manet,
Popular Searches: ppt on selfish network, book of mobile adhoc networks of author sivaramamoorthy, kasiski java code, mobile adhoc network projects in java, solutions to node detection doc, what is mobility of node in wsn, www school3 com java tutorial,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  mpt myanmar mobile phone bill hacking Guest 1 122 12-10-2016, 09:13 AM
Last Post: amrutha735
Wink free donload source ranking model adaptation for domain specific search in java Guest 1 52 12-10-2016, 09:12 AM
Last Post: amrutha735
  gait recognition matlab source code Guest 1 75 12-10-2016, 09:04 AM
Last Post: amrutha735
  abstract for bluetooth based mobile phone photo browser Guest 1 39 11-10-2016, 03:47 PM
Last Post: amrutha735
  online college election project in jsp with source code free download Guest 1 45 11-10-2016, 02:27 PM
Last Post: amrutha735
  matlab project breast cancer detection code free download Guest 1 54 11-10-2016, 12:57 PM
Last Post: amrutha735
  opengl source code for elevator Guest 1 64 11-10-2016, 12:18 PM
Last Post: amrutha735
  futurescope underwater wireless communication networks Guest 1 67 11-10-2016, 12:16 PM
Last Post: amrutha735
  indian fake currency detection using matlab code Guest 1 71 11-10-2016, 11:57 AM
Last Post: amrutha735
Thumbs Up exudate segmentation matlab code Guest 1 38 11-10-2016, 11:26 AM
Last Post: amrutha735