alexa Mitigating Malicious Activities by Providing New Ackno
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Mitigating Malicious Activities by Providing New Acknowledgment Approach

G. S. Devi Lakshmi1, J. Rajasekaran2
  1. PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India1
  2. Assistant Professor, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India2
Related article at Pubmed, Scholar Google


New Ack scheme is efficient in finding malicious nodes and effective in transmitting the date in the presence of malicious nodes. In MANET data transmission in the presence of malicious nodes is the major problem. In existing watchdog scheme, there are two parts namely watchdog and pathrater. The watchdog detects the malicious node. If it next node is fails transmit the data means it increase the failure counter and also if a particular fails to transmit the data within a particular period of time means also it increase the failure counter and marks that node as an malicious. Pathrater task is just filtering the malicious node from the future transmission. If pathrater filtering the malicious node and transmission will be with the low transmission power and collision occurrence is more. N the proposed Enhancement two schemes are used first scheme identifies the malicious node and generates malicious report. Second scheme verifies the malicious report and authenticates the sender that the particular node is malicious and finds a path to transmit the data in MANET.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version