Social-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals

Abstract

In social based mobility network comprises of selfish individuals that are not willing to forward the packets but wants to forward their own messages. Proposed system uses a context based protocol that can be used in social aware network like PSN. Here suggests a method to effectively detect selfish nodes from the network. It helps to differentiate selfish nodes from broken and overloaded nodes. In adhoc network throughput increases when all available nodes are used for routing and forwarding. So instead of avoiding selfish nodes from the routing path as mentioned in existing solutions can effectively utilizes all the existing nodes The proposed system also suggests a method to avoid selfish behavior among the nodes and a method to make the selfish nodes forward the message without any hesitation. For transferring the data using selfish nodes uses an enhanced epidemic forwarding protocol in the system.

Authors and Affiliations

Bency Wilson , Preetha K G

Keywords

Related Articles

Techniques of Software Fault Tolerance

Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. We should accept that, relying on software techniques for obtaining dependability means accepting some...

INTERIOR DECORATION USING AUGMENTED REALITY WITH COLOR PERCEPTION

The hands of Augmented Reality has been widened in all the fields by using it we can able to merge the virtual world objects with the real world environment in the android platform. By using this application we can able...

Preventing mitm attack in simple secure pairing in Bluetooth

Secure simple pairing has been adopted by Bluetooth version “Bluetooth 2.1+EDR(ENHANCED DATA RATE).It should be noted that for establishing Bluetooth connection that uses Diffie hellman public cryptography in its commu...

Encryption/decryption tool with cryptanalysis

The dissertation titled” Encryption/Decryption Tool with Cryptanalysis” is based on the concept of cryptographic system. We have implemented a set of encryption/decryption methods which include Hill Cipher, Caesar Cipher...

Routing protocols in underground coalmine environment: A Review

Researchers have worked on routing issues for adhoc-networks, VANET’s, and Wireless Sensor Networks in a normal scenario; recently there has been a recent trend towards the study on underground wireless networks and prop...

Download PDF file
  • EP ID EP109485
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Bency Wilson, Preetha K G (2013). Social-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals. International Journal of Computer Science & Engineering Technology, 4(7), 1038-1042. https://europub.co.uk/articles/-A-109485