Improving the Performance of Mobile Ad Hoc Network Using a Combined Credit Risk and Collaborative Watchdog Method

α
saraswathi
saraswathi
σ
S.J.K. Jagadeesh Kumar
S.J.K. Jagadeesh Kumar
ρ
R.Saraswathi
R.Saraswathi
Ѡ
R.Raja
R.Raja
α Anna University, Chennai Anna University, Chennai

Send Message

To: Author

Improving the Performance of Mobile Ad Hoc Network Using a Combined Credit Risk and Collaborative Watchdog Method

Article Fingerprint

ReserarchID

CSTNWSA2084

Improving the Performance of Mobile Ad Hoc Network Using a Combined Credit Risk and Collaborative Watchdog Method Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

In mobile ad hoc networks, nodes can move freely and link/node failures occur frequently. This leads to frequent network partitions, which may significantly degrade the performance of data access in ad hoc networks. When the network partition occurs, mobile nodes in one network are not able to access data hosted by nodes in other networks. In mobile ad hoc network, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. In this work, the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation is examined. We term this selfish replica allocation. A combined credit risk method & collaborative watchdog is proposed to detect the selfish node and also apply the SCF tree based replica allocation method to handle the selfish replica allocation appropriately. The proposed method improves the data accessibility, reduces communication cost and average query delay and also to reduce the detection time and to improve the accuracy of watchdogs in the collaborative method.

References

27 Cites in Article
  1. Unknown Title.
  2. Luzi Anderegg,Stephan Eidenbenz (2003). Ad hoc-VCG.
  3. G Cao,L Yin,C Das (2004). Cooperative Cache-Based Data Access in Ad Hoc Networks.
  4. Chun Chaudhuri,With Barreno,Papadimitriou,Kubiatowicz (2004). Selfish Caching in Distributed Systems: A Game-Theoretic Analysis.
  5. Heart,S Madria (2006). Data Replication for Improving Data Accessibility in Ad Hoc Networks.
  6. T Heart (2001). Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility.
  7. Jae-Ho Chi,Kym-Sun Shim,Sunken Lee,Kun-Lung Wu (2012). Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network.
  8. Jing Deng,K Balakrishnan (2007). An Acknowledgement Based Approach for the Detection of Routing Misbehavior in MANETs.
  9. S Khan,I Ahmad (2009). A Pure Nash Equilibrium-Based Game Theoretical Method for Data Replication across Multiple Servers.
  10. Lucky,Yang (2003). Reputation Propagation and Agreement in Mobile Ad-Hoc Networks.
  11. ' Paul,Westhoff (2002). Balancing the Tradeoffs between Data Accessibility and Query Delay in Ad Hoc Networks.
  12. Yoo,D Agrawal (2006). Why Does It Pay to be Selfish in a MANET.
  13. Li Zhai,Lax (2005). Data Caching in Selfish Mantes Proc.
  14. Sergio Marti,T Giuli,Kevin Lai,Mary Baker (2000). Mitigating routing misbehavior in mobile ad hoc networks.
  15. H Miranda,L Rodrigues (2003). Friends and foes:preventing sel .shness in open mobile ad hoc networks.
  16. Yangchow Zhang,Wing Lou (2004). A Secure Incentive Protocol against selfishness in Mobile Ad Hoc Networks.
  17. Hussein Haran,A Shahrestani Improving the reliability of ad-hoc on demand distance vector protocol.
  18. Rituparnachaka Debuts (2011). MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System.
  19. A Datta,M Hauswirth,K Aberer (2003). Updates in highly unreliable,replicated peer-to-peer systems.
  20. F Dabber,M Kai-Shek,D Karrer,R Morris,I Stoic (2001). Wide-area cooperative storage with CFS.
  21. Chao-Tung Yang,Chun-Pin Fu,Ching-Hsien Hsu (2009). File replication, maintenance, and consistency management services in data grids.
  22. J Zhao,Q Li,X Li (2005). Data Caching in Selfish Mantes.
  23. S.-Y Wu,Y.-T Chang (2006). A User-Centered Approach to Active Replica Management in Mobile Environments.
  24. Prasanna Padmanabhan,Le Gruenwald,Anita Vallur,Mohammed Atiquzzaman (2008). A survey of data replication techniques for mobile ad hoc network databases.
  25. L Yin,G Cao (2004). Balancing the Tradeoffs between Data Accessibility and Query Delay in Ad Hoc Networks.
  26. R Baumeister,M Leary (1995). The Need to Belong: Desire for Interpersonal Attachments as a Fundamental Human Motivation.
  27. G Ding,B Bara (2004). Peer-to-Peer File-Sharing over Mobile Ad Hoc Networks.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

saraswathi. 2013. \u201cImproving the Performance of Mobile Ad Hoc Network Using a Combined Credit Risk and Collaborative Watchdog Method\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E6): .

Download Citation

Issue Cover
GJCST Volume 13 Issue E6
Pg. 57- 65
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

May 9, 2013

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 9419
Total Downloads: 2524
2026 Trends
Related Research

Published Article

In mobile ad hoc networks, nodes can move freely and link/node failures occur frequently. This leads to frequent network partitions, which may significantly degrade the performance of data access in ad hoc networks. When the network partition occurs, mobile nodes in one network are not able to access data hosted by nodes in other networks. In mobile ad hoc network, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. In this work, the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation is examined. We term this selfish replica allocation. A combined credit risk method & collaborative watchdog is proposed to detect the selfish node and also apply the SCF tree based replica allocation method to handle the selfish replica allocation appropriately. The proposed method improves the data accessibility, reduces communication cost and average query delay and also to reduce the detection time and to improve the accuracy of watchdogs in the collaborative method.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Improving the Performance of Mobile Ad Hoc Network Using a Combined Credit Risk and Collaborative Watchdog Method

S.J.K. Jagadeesh Kumar
S.J.K. Jagadeesh Kumar
R.Saraswathi
R.Saraswathi
R.Raja
R.Raja

Research Journals