Admissions Open
Admissions Open
In this paper, the work behavior and characterization of selfish node is explored. The paper has presented three different algorithms called token based, agent based and watchdog methods to detect selfish node attack. The characteristics and the work behavior of these methods is provided in this paper. These methods are simulated on a mobile network. The analysis results shows that the token based method has achieved the better packet communication, byte communication ratio and reduced the communication loss. The watchdog and agent based method also performed better in terms of lesser communication delay.
OTHER INSTITUTIONS UNDER MMT