The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


This paper depicts a model which not only evaluates the node's reputation, but also avoids the malicious node in the forwarding path. The simulation is performed by using the NS2 software. This model uses the IEEE 802.11 protocol with RTS, CTS, DATA and ACK signalling at the MAC layer. The paper models packet forwarding, passive misbehavior, active misbehavior and avoidance of malicious nodes in the route. The model also takes into account the blocking caused by the hidden node problem in wireless networks. The results achieved are both graphical as well as in the form of a network animation. Curves such as throughput and jitter are plotted to analyse the performance of the MANET.

Keywords

RTS, CTS, Clone Node, Jitter , Throughput
User