Author(s) Name:  Anurag Kumar Jaiswal
The objective of the book is to find such malicious nodes during Routing in MANET. This routing process requires full co-operation from all the participating nodes to transfer the packet from source to destination. During the route establishment phase it prepares a list of nodes through which the packet will travel.
Nodes involved in this list are supposed to transfer the data packet to the next node in the route with maximum probability, and try to reduce the overhead of packet retransmission because of lack of system support. But sometimes the intermediate nodes behave maliciously by not forwarding the packet to the next node.
Routing in MANET requires full co-operation from all the participating nodes to transfer the packet from source to destination. During the route establishment phase it prepares a list of nodes through which the packet will travel. Nodes involved in this list are supposed to transfer the data packet to the next node in the route with maximum probability, and try to reduce the overhead of packet retransmission because of lack of system support. But sometimes the intermediate nodes behave maliciously by not forwarding the packet to the next node, our objective is to finding those malicious nodes.
ISBN:  3659165425
Publisher:  LAP Lambert Academic Publishing
Year of Publication:  2012
Book Link:  Home Page Url