Professional Documents
Culture Documents
Fig. 3. Sinkhole node is detected and pacets are routed to alternative route.
Packet loss = Total number of packets sent – Total number of packets received ( 4)
Fig. 4. Flow chart of the proposed methodology Fig. 5. Inserting a Sink node/Malicious node into the network before data
transmission
sinkhole node is entering the network and dropping all the
packets while it is entering the network.
Before Data
2705.09 45 23.24 0.05
Transmission
Sinkhole
Insertion
During Data
3077.19 61 20.63 0.047
Transmission
Before Data
2719.28 0 24.87 0.045
Sinkhole Transmission
Detection
During Data
2875.80 0 23.49 0.044
Transmission
TABLE II.
SIMULATION PARAMETERS
S. No. Parameter Value
1 Simulation Time 10 seconds
2 Number of Nodes 25
Fig. 12. Data transmission is broadcasted to alternative nodes when sinkhole 3 Topology 1060*565
is entering the network.
4 MAC Protocol IEEE 802.11