Journal of research in engineering and its applications Vol. 1, Issue. 1, (2018), pp. 08-15 1 Identifying Selfish Node Behavior by Using Node Replacement Algorithm M.Sandhini 1 and S.Saravanan 2 1 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering & Technology, India 1 Email id: itsmesandhini18@gmail.com 2 Assistant Professor (SL.G), Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering &Technology, India 2 Email id: barathsamraj@yahoo.co.in Abstract A foundation work in the remote sensor organize which is more dependable to safeguarding and honest location of parcel dropping assaults is the conduct of the multi bounce remote sensor specially appointed system neighbors is demonstrated and the goal is to ponder the effect of their insight into the correspondence setting to choose conduct of the honest hub on the framework execution. In this task, we propose a novel STARS for portability hubs. STARS is essentially an assaulting framework, which just needs to catch the crude activity from the PHY/MAC layer without investigating the substance of the captured bundles. From the caught bundles, STARS develops a grouping of point-to-point movement networks to determine the conclusion to-end activity lattice, and after that uses a heuristic information preparing model to uncover the concealed movement designs from the conclusion to end framework. Our experimental investigation exhibits that the current MANET frameworks can accomplish exceptionally limited correspondence namelessness under the assault of STARS. Keywords: Communication context, traffic matrices, mobility, STARS, packet dropping, node behavior. 1. INTRODUCTION Mobile ad hoc network (MANET) is a self-outlining structure less arrangement of PDAs related by remote framework. One of the essential issues of MANET is correspondence indefinite quality. Correspondence anonymity has two points: Source/objective mystery and End-to-End relationship lack of clarity. In source/objective indefinite quality it is difficult to perceive the sources or the objectives of the framework streams while in end-to-end relationship mystery it is difficult to recognize the end - to-end correspondence relations. In MANET correspondence anonymity has been proposed by baffling directing traditions, for instance, ANODR (Anonymous On-Demand Routing), OLAR (On-ask for Lightweight Anonymous Routing). Regardless of the way that secretive controlling traditions are open still the adversaries can keep an eye on the remote channel, catch the transmission and after that perform development examination ambush. The trailblazer ambush and disclosure strike can accumulate information and perform examination inconspicuously without changing the framework direct. These techniques don't work commendably to explore movement in MANET. This due to the going with three nature of MANET: 1) Broadcasting nature: In wired frameworks point to point transmission can be easily associated in light of only a solitary possible beneficiary. While in remote framework message is imparted to various authorities. 2) Ad hoc nature: Mobile center point can be filling in as both source and objective. In this way it is difficult to choose the piece of the center. 3) Mobile nature: Traffic examination indicate don't consider the adaptability of correspondence peers. This makes the correspondence among flexible center point more complex.The rapidly creating universe of progressions, a consistently expanding number of associations