345 Rajaram Jatothu, Dr. R. P. Singh International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 6, Issue 10 October 2017 The Efficient Route Management Protocol for Misbehavior in Ad Hoc Networks Rajaram Jatothu 1 , Dr. R. P. Singh 2 1 Research Scholar , Department of Computer Science and Engineering , Sri Satya Sai University of Technology and Medical Science, Sehore,Bhopal, Madhya Pradesh , India. 2 Professor, Department of Computer Science and Engineering , Sri Satya Sai University of Technology and Medical Science, Sehore, Bhopal, Madhya Pradesh , India Abstract Ad hoc wireless networks have emerged as one of the key growth areas for wireless networking and computing technology. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. One of the major factors effecting the ad hoc communication is the misbehaving of nodes. Although an efficient power management scheme is applied to an ad hoc network, a misbehaving node may result in the improper routing of packet which may extend to the complete collapsing of the network also. Existing approaches such as economic incentives or secure routing by cryptographic means alleviate the problem to some extend with limitations. The main objective of this project is to cope with misbehavior. This paper task, address the question of how to enable a system to operate despite the presence of misbehavior in a mobile ad-hoc network. How the network can be functional for normal nodes when other nodes do not route and forward the packet correctly. In this paper an optimal routing protocol for misbehaving network called RMP (Route Management Protocol) to cope with misbehavior for ad hoc network is proposed. The protocol enables nodes to detect misbehavior by first-hand observation and use of second- hand information provided by other nodes. A fully distributed reputation system that can cope with false information and effectively use second information in a safe way is proposed. The approach uses a modified Bayesian estimation and classification procedure for the isolation of malicious and selfish node in a given network. The proposed task is to be implemented on Mat lab tool for the protocol implementation and verification. Key words: Misbehavior; Route Management Protocol (RMP); Ad hoc networks; Bayesian analysis 1. INTRODUCTION Wireless networking grows rapidly because of the human desires for mobility and for freedom from limitation, i.e., from physical connections to communication networks. Recent advances in wireless technology have equipped portable computers, such as notebook computers and personal digital assistants with wireless interfaces that allow networked communication even while a user is mobile. A particular kind of wireless network called mobile ad hoc networks is presently under development. A mobile ad hoc network is a self-organizing and rapidly deployable network in which neither a wired backbone nor a centralized control exists. The network nodes communicate with one another over scarce wireless channels in a multi-hop fashion. The ad hoc network is adaptable to the highly dynamic topology resulted from the mobility of network nodes and the changing propagation conditions. These networks are used in emergency disaster rescue operation, tactical military communication and law enforcement. In these applications, where a fixed backbone is not available, a readily deployable wireless network is needed. Mobile ad hoc networks are also a good alternative in rural areas or third world countries where basic communication infrastructure is not well established The limited resources in MANETs have made designing of an efficient and reliable routing strategy a very challenging problem. An intelligent routing strategy is required to efficiently use the limited resources while at the same time being adaptable to the changing network conditions such as: network size, traffic density and network partitioning. In parallel with this, the routing protocol may need to provide different levels of QoS to different types of applications and users.