Object Deployment Using Data Trans-Reception in Military Applications
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 4
Abstract
An mobile ad-hoc network (MANETs) is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme.
Authors and Affiliations
Subha J , Karthikeyan R
A Review on Impersonation Attack in Mobile Ad-Hoc Network
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration....
Dynamic Load Balancing Algorithm in the Global-Local Order
Most traditional dynamic load balancing schemes for hierarchical environments have applied local load balancing first and have expands it to the global load balancing. The major problem of the approach is that unnecessar...
Deriving the Probability with Machine Learning and Efficient Duplicate Detection in Hierarchical Objects
Duplicate detection is the major important task in the data mining, in order to find duplicate in the original data as well as data object. It exactly identifies whether the given data is duplicates or not. Real world du...
Battery-Powered Mobile Computer using Denial of Service
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of...
Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks
A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...