Recently I am working with ns2 simulator to detect the malicious nodes and avoid those nodes to send copies from the source or intermediate nodes.

More Md. Sharif Hossen's questions See All
Similar questions and discussions