Sriden - Self Assurance Report Based Interloper Detection and Elimination in Adhoc Network


  • S Vijitha
  • S Bhavani





Watching, live network, self-protection, consistent transmissions, minimized delay, maximum throughput.


Ad Hoc network connections with mobile nodes and its individual uniqueness like lively topology, multi-hop communications and simple network setup, faced plenty of confronts in routing, and security issues. The security disputes arise due to wireless self-arrangements and self-protection competence. In the background of ad hoc networks, there is an added motivation for keeping network with protective and consistent data transmission in order to extend network lifetime. As proposed, network security is improved by watching and eliminating the interlopers. In addition, to maximize throughput, minimizing delay may help to reduce the net loss.



[1] Roy S, Saha D, Bandyopadhyay S, Ueda T & Tanaka, S, “A network-aware MAC and routing protocol for effective load balancing in ad hoc wireless networks with directional antennaâ€, 4th ACM international symposium on Mobile ad hoc networking & computing, (2003), pp.88-97.

[2] Hosoi-Tanabe S & Sako Y, “Species-Specific Detection and Quantification of Toxic Marine Dinoflagellates Alexandrium tamarense and A. catenella byReal-Time PCR Assayâ€, Marine biotechnology, Vol.7, No.5, (2005), pp.506-514.

[3] Jain J, Fatima M, Gupta R & Bandhopadhyay K, “Overview and challenges of routing protocol and MAC layer in mobile ad-hoc networkâ€, Journal of Theoretical and Applied Information Technology, Vol.8, No.1, (2009), pp.6-12.

[4] Rajaram A & Palaniswami DS, “Malicious node detection system for mobile ad hoc networksâ€, International Journal of Computer Science and Information Technologies, Vol.1, No.2, (2010), pp.77-85.

[5] Goyal P, Parmar V & Rishi R, “Manet: vulnerabilities, challenges, attacks, applicationâ€, IJCEM International Journal of Computational Engineering & Management, Vol.11, (2011), pp.32-37.

[6] Saini R & Khari M, “Defining malicious behavior of a node and its defensive methods in ad hoc networkâ€, International Journal of Computer Applications, Vol.20, No.4, (2011), pp.18-21.

[7] Aarti DST, “Study of Manet: Characteristics, challenges, application and security attacksâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, No.5, (2013), pp.252-257.

[8] Kaur R & Singh J, “Towards security against malicious node attack in mobile ad hoc networkâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, No.7, (2013).

[9] Shrivastava N & Motwani A, “Survey of malicious attacks in MANETâ€, International Journal of Computer Applications, Vol.80, No.14, (2013), pp.26-30.

[10] Raja L & Baboo SS, “An overview of MANET: Applications, attacks and challengesâ€, International Journal of Computer Science and Mobile Computing, Vol.3, (2014), pp.408-417.

[11] Punwatkar DD & Hande KN, “A Review of Malicious Node Detection in Mobile Ad-hoc Networksâ€, International Journal of Computer Sciences and Engineering, Vol.2, No.2, (2014), pp.65-69.

[12] Ali D & Seyed RK & Esmail K, “Security Challenges in Mobile ADHOC Networks: A Surveyâ€, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.1, (2015).

[13] Naeem R, Muhammad UA, Muhammad QA, Omair A & Muhammad I, “Mobile Ad-Hoc Networks Applications and Its Challengesâ€, Communications and Network, Vol.8, (2016), pp.131-136

[14] G Ainabekova, Z Bayanbayeva, B Joldasbekova, A Zhaksylykov (2018). The author in esthetic activity and the functional text (on the basis of V. Mikhaylov’s narrative (“The chronicle of the great juteâ€). Opción, Año 33. 63-80.

[15] Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, Opción, Año 33. 475-499

View Full Article: