Admissions Open

Toll Free : 1800 2740 240

logo white (1)

In this paper, the work behavior and characterization of selfish node is explored. The paper has presented three different algorithms called token based, agent based and watchdog methods to detect selfish node attack. The characteristics and the work behavior of these methods is provided in this paper. These methods are simulated on a mobile network. The analysis results shows that the token based method has achieved the better packet communication, byte communication ratio and reduced the communication loss. The watchdog and agent based method also performed better in terms of lesser communication delay.

Admission Enquiry 2025-26

Skip to content