Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-9 Number-9                          
Year of Publication : 2014
Authors : Mr. N.Deethshith , Mr. N. Jaya Prakash , Mr.A.Gunaseelan , Mr. S. P. Santhoshkumar
  10.14445/22315381/IJETT-V9P287

MLA 

Mr. N.Deethshith , Mr. N. Jaya Prakash , Mr.A.Gunaseelan , Mr. S. P. Santhoshkumar. "Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation ", International Journal of Engineering Trends and Technology (IJETT), V9(9),454-459 March 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this causes frequent changes in the network topology. Data in one network cannot be accessed by the host in another network; the data accessibility from one network to another network becomes impossible, consequently data accessibility become lower in the wireless network than in the conventional fixed network. This leads to performance degradation. Many Duplication allocation methods are used to improve the data accessibility by duplicating data item on mobile hosts other than the original owner of the data. This improves the data accessibility but some of the mobile hosts in the network may act as egotistic nodes. These nodes use the services of other nodes but this does not cooperate with other nodes, this reduces the overall data accessibility. Egotistic node detection algorithm is used to detect the egotistic nodes and then the data duplication allocation method is used for data duplicationtion. The simulation result shows that the conducted egotistic node detection method and duplication allocation techniques outperforms the improvement in data accessibility and reduce the communication cost and query delay.

References

[1] K. Balakrishnan, J. Deng, and P.K. Varshney, ―TWOACK: Preventing Egotisticness in Mobile Ad Hoc Networks‖, Proc. IEEE Wireless Comm. And Networking, pp. 2137-2142, 2005.
[2] T. Hara, ―Effective Duplication Allocation in Ad Hoc Networks for Improving Data Accessibility‖, Proc. IEEE INFOCOM, pp. 1568-1576, 2001.
[3] S. Marti, T. Giuli, K. Lai, and M. Baker, ―Mitigating Routing Misbehavior in Mobile Ad hoc Networks‖, Proc. ACM MobiCom. 255-265, 2000.
[4] H. Miranda and L. Rodrigues, ―Friends and Foes: Preventing Egotisticness in Open Mobile Ad hoc Networks‖, Proc. IEEE Int’l Conf. Distributed Computing Systems Workshops, pp. 440-445, 2003.
[5] P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, ―A Survey of Data Duplicationtion Techniques for Mobile Ad Hoc Network Databases‖, The Int’l J. Very Large Data Bases, vol. 17, no. 5, pp. 1143-1164, 2008.
[6] K. Paul and D. Westhoff, ―Context Aware Detection of Egotistic Nodes in DSR Based Ad-Hoc Networks‖, Proc. IEEE Global Telecomm. Conf., pp. 178-182, 2002.
[7] W. Wang, X.-Y. Li, and Y. Wang, ―Truthful Multicast Routing in Egotistic Wireless Networks‖, Proc. ACM MobiCom, pp. 245-259, 2004.
[8] L. Yin and G. Cao, ―Balancing the Tradeoffs between Data Accessibility and Query Delay in Ad Hoc Networks‖, Proc. IEEE Int’l Symp. Reliable Distributed Systems, pp. 289-298, 2004.
[9] Frank Kargl, Andreas Klenk, Michael Weber and Stefan Schlott, ―Sensors for Detection of Misbehaving Nodes in MANETs‖, Department of Multimedia Computing University of Ulm, 2009.
[10] Takahiro Hara, ―Duplication Allocation Methods in Ad Hoc Networks with Data Update‖, Mobile Networks and Applications 8, 343–354, 2003.
[11] Dipali Koshti, Supriya Kamoji, ―Comparative study of Techniques used for Detection of Egotistic Nodes in Mobile Ad hoc Networks‖, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-1, Issue-4, September 2011.
[12] Khairul Azmi Abu Bakar and James Irvine Department of Electronic & Electrical Engineering University of Strathclyde, ―Contribution Time-based Egotistic Nodes Detection scheme‖, ISBN: 978-1-902560-24-3 © 2010 PGNet.
[13] Martin Schütte, ―Detecting Egotistic and Malicious Nodes in MANETs‖, seminar: sicherheit in selbstorganisierenden netzen, hpi/universität potsdam, sommersemester 2006.
[14] S. Usha,member, IACSIT and S. Radha, ―Multi Hop Acknowledgement Scheme based Egotistic Node Detection in Mobile Ad hoc Network‖, international Journal of Computer and Electrical Engineering, Vol.3, No. 4, August 2011.
[15] Martin Schütte, ―Detecting Egotistic and Malicious Nodes in MANETs‖, seminar: sicherheit in selbstorganisierenden netzen, hpi/universität potsdam, sommersemester 2006.
[16] TAKAHIRO HARA, ―Duplication Allocation Methods in Ad Hoc Networks with Data Update‖, Mobile Networks and Applications 8, 343–354, 2003.
[17] Jae-Ho Choi, Kyu-Sun Shim, SangKeun Lee, and Kun- Lung Wu, ―Handling Egotisticness in Duplication Allocation over a Mobile Ad Hoc Network‖, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.11, NO. 2, FEBRUARY 2012.
[18] Mr. S. P.Santhoshkumar1, Mr. D. Prabakar2, Dr. S. Karthik3, "Public Alert System over Cellular Networks", IJAIR, Volume 2, Issue 8 August 2013

Keywords
Data accessibility, Degree of egotistic, Mobile Ad-hoc network, Duplication allocation