Loading

An Experimental Analysis on Selfish Node Detection Measures and Methods
Sumiti1, Sumit Mittal2

1Sumiti, Research Scholar, M. M. Institute of Computer Technology and Business Management, Maharishi Markandeshwar (Deemed to be University), Mullana, Ambala (Haryana), India.

2Dr. Sumit Mittal, Professor, M. M. Institute of Computer Technology and Business Management, Maharishi Markandeshwar (Deemed to be University), Mullana, Ambala (Haryana), India.

Manuscript received on 08 June 2019 | Revised Manuscript received on 13 June 2019 | Manuscript Published on 08 July 2019 | PP: 316-322 | Volume-8 Issue-8S3 June 2019 | Retrieval Number: H10850688S319/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile network is an open space network that suffers from various internal and external attacks. Selfish node is one such attack form that occurs in intermediate nodes. In this paper, the work behavior and characterization of selfish node is explored. The paper has presented three different algorithms called token based, agent based and watchdog methods to detect selfish node attack. The characteristics and the work behavior of these methods is provided in this paper. These methods are simulated on a mobile network. The analysis results shows that the token based method has achieved the better packet communication, byte communication ratio and reduced the communication loss. The watchdog and agent based method also performed better in terms of lesser communication delay.

Keywords: Mobile Network, Malicious Node, Selfish Node, Selfish Node Detection Method.
Scope of the Article: Mobile Networks & Wireless LAN