Call for papers :

Submission Last Date 30/04/2018
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
Improvement of Packet Dropping in MANETs by Using Acknowledge Based Approach
Main requirement in mobile ad hoc network (MANET) is to maintain the communication to all nodes and each node should amalgamate to each other. In the case of malicious nodes, it may create serious security issues, for the time of malicious nodes may collapse the routing process. In this text, defending the blackhole attack is the issued. This paper is used to solve packet drooping by using Temporally Ordered Routing Algorithm (TORA) routing by cooperative bait detection approach (CBDA) with malicious node detection algorithm. TORA referred the hybrid routing protocol and CBDA referred reactive and proactive routing mechanism. Malicious node detection algorithm indentifies the malicious nodes in the network. TORA based on concept of link reversal approach and CBDA implements a reverse tracing approach to achieve the desired goal. Simulation results have mentioned, TORA, existence of malicious nodes in TORA and securing malicious nodes in TORA by using CBDA with Malicious node detection algorithm in terms of packet delivery ratio, end-to-end delay, normalized routing overhead and throughput (taken as performance matrices).
Query (QUE), Update (UPD), TORA, Malicious node, Mobile ad hoc network (MANET), Cooperative baits detection approach (CBDA), TORA with malicious nodes, Secure TORA
Others Details
Paper Id : 75369
Author Name : Nikhil G. Wakode
Volume/Issue No : Volume 04 Issue 07
Page No : 57-62
DOI Number : DOI:10.21090/IJAERD.75369
Publication Date : 2017-07-08
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website :
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406