Selfish Node Detection in Replica Allocation over MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 5
Abstract
: MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wireless network that has neither a fixed infrastructure nor a central server. Each node in a MANET acts as a router, and communicates with each other. In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality, however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. I
Authors and Affiliations
Kishore Kumar
Emergency Vehicle Priority Preference at Multiple Wireless Network Sensors (MWNS) Intelligent Road Traffic Signal Control System
Abstract: Traffic control management system has to be intelligent and equitable in signal allocation management system, especially priority order has to be given to emergency vehicles so as to prevent unforeseen...
A Step-Wise Procedure to Develop an Algorithm for Image Brightness Using Edge Detection Principles
Abstract: This paper uses the technique of edge detection to make the image of an oil pipeline toappear bright and clear for further investigations after applying Mathematical morphology for curve error detection....
Advanced Redundancy Management Of Heterogeneous Using The Packet Dropper With Nodes For Multipath routing
Abstract: Developing a secured environment for detectingmalicious nodes in a heterogeneous wireless sensor network(HWSN).Here which is analysing the best redundancylevel using path redundancy and sourceredundancy.P...
Providing The Security Against The DDOS Attack In Mobile AdHoc Networks
Abstract: The extensive applications of Mobile ad hoc networks are in civilian and military. In the MANETsnodes are joining to any point and leave the network at any point of time. This generic characteristic of MA...
An Efficient Approach for Requirement Traceability Integrated With Software Repository
Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since  ...