Detection of Routing Misbehavior in MANETs with 2ACK scheme
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 1
Abstract
The Routing misbehavior in MANETs (Mobile Ad Hoc Networks) is considered in this paper. Commonly routing protocols for MANETs [1] are designed based on the assumption that all participating nodes are fully cooperative. Routing protocols for MANETs are based on the assumption which are, all participating nodes are fully cooperative. Node misbehaviors may take place, due to the open structure and scarcely available battery-based energy. One such routing misbehavior is that some nodes will take part in the route discovery and maintenance processes but refuse to forward data packets. In this, we propose the 2ACK [2] scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their effect. The basic idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. To reduce extra routing overhead, only a few of the received data packets are acknowledged in the 2ACK scheme.
Authors and Affiliations
Chinmaya Kumar Nayak, G K Abani Kumar Dash, Kharabela parida, Satyabrata Das
A Survey on Smartphones Systems for Emergency Management (SPSEM)
Emergency never runs with earlier intimations and indications. In the real world and practical life, detecting and perceiving such emergencies and reporting them are a genuine test and tough challenge. Smartphones System...
Performance Evaluation of Different Data Mining Techniques for Social Media News Credibility Assessment
Social media has recently become a basic source for news consumption and sharing among millions of users. Social media platforms enable users to publish and share their own generated content with little or no restrictio...
Image Segmentation Via Color Clustering
This paper develops a computationally efficient process for segmentation of color images. The input image is partitioned into a set of output images in accordance to color characteristics of various image regions. The al...
A Novel Approach for Ranking Images Using User and Content Tags
In this study, a tag and content-based ranking algorithm is proposed for image retrieval that uses the metadata of images as well as the visual features of images, also known as “visual words” to retrieve more relevant i...
Security Issues in the Internet of Things (IoT): A Comprehensive Study
Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. These systems use wired,...