The Feasibility of Content Sharing With (Dtn) On Commercial Smart Phones
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
The increase in the number of smart phone users has lead to the increase in the peer-topeer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity between smart phones. Thus new content sharing mechanisms should be proposed. To share the contents in such a scenario, researchers have proposed store-carryforward as an efficient content sharing scheme with efficient a client-based cache consistency scheme that is implemented for caching data items .where a node stores a message and carries it for certain duration until a communication opportunity arises and then delivers it to the destination. Previous works in this field focused on whether two nodes would encounter each other and the place and time of encounter and did not consider the activities of malicious peers. This paper proposes discoverpredict-deliver as efficient content sharing scheme where special nodes cache the queries and the addresses of the nodes that store the responses to these queries that enable peers to share contents.
Authors and Affiliations
K Aparna, M Jyothi
An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and...
Multi Biometric Model for Authentication Method
In recent years, biometric authentication has seen considerable improvements in reliability and accuracy,with some biometrics contribute reasonably good overall performance. In biometric based systems for identity ve...
Ensuring Data Storage Security in a Cloud Computing Using ‘MONA’
Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing. Identity privacy and Privacy preserving from an entrusted cloud is still a challenging issue....
Detection and Prevention Of Cooperative Black Hole Attack in a MANET
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...
Providing High Security for WSN’s Using Distributed Hash Table (DHT)
There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized,...