Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to its own use. However in real world most of the nodes misbehave in order to gain extra bandwidth. Therefore detecting these nodes and providing countermeasure is essential for network performance. This paper proposes a scheme called Hash Function based MAC protocol (HsF-MAC) to cope with backoff cheating technique. HsF-MAC allows MANET nodes to recalculate the backoff value and immediately detect the misbehaving nodes along with effective countermeasure. Moreover colluding behavior (two nodes trying to misbehave collectively) is also detected.
Authors and Affiliations
Nagaraju Mopidevi, Madhu Ramarkula
Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework
In this research paper, a novel system has been designed which is using two discipline of Computer science area which are Artificial intelligence and image Processing. Fuzzy sets and logic has been chosen from AI and...
To Measure The Average Delay Experienced By A Subscriber To Connect In An Attribute Tree
Validation of publishers and subscribers is not simple to get due to the loose coupling ofpublishers and subscribers.We also present extensions of the cryptographic methods to proffer capable routing of encrypted eve...
Accurate Alignment of Search Result Records from Web Data Base
Most search engines are returning results page that are come from structured databases. This type of search engines also referred as web databases. Each results page contains search results records and each record con...
Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET
A mobile ad hoc network is self configuring, resource poor and has dynamically changing topology. Keeping in view these constraints and complexity number of routing protocols are proposed. The most popular protocols...
A Review Paper on Colored Petri Nets and their Application in Protocol Verification
Colored Petri Nets is a graphical oriented language for design, verification and validation of systems. It is mainly used in systems where concurrency, communication and synchronisation are important. This paper is an...