Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2016

01.05.2016

A node management scheme for stable P2P service in mobile ad-hoc networks

verfasst von: Hyun-Jong Cha, Ho-Kyung Yang, Yong-Ho Kim

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Corson S, Macker J (1998) Mobile ad hoc Networking(MANET). In: Proc. of ACM SIGMOBILE mobile computing and Communications Review Volume 2 Issue 1, 9–14 Corson S, Macker J (1998) Mobile ad hoc Networking(MANET). In: Proc. of ACM SIGMOBILE mobile computing and Communications Review Volume 2 Issue 1, 9–14
2.
Zurück zum Zitat Perkins CE (2008) Mobile ad hoc networking. In: Addison-Wessley Professional Perkins CE (2008) Mobile ad hoc networking. In: Addison-Wessley Professional
3.
Zurück zum Zitat Corson S, Macker J, Batsell S (1996) Architectural considerrations for mobile mesh networking. In: Proc. of military communication conference. IEEE Press, pp.225–229 Corson S, Macker J, Batsell S (1996) Architectural considerrations for mobile mesh networking. In: Proc. of military communication conference. IEEE Press, pp.225–229
4.
Zurück zum Zitat Curiac DI, Banias O, Dragan F, Volosencu C, Dranga O (2007) Malicious node detection in wireless senser networks using an autoregression technique. In: 3rd international conference on networking and services, Athens, p.83 Curiac DI, Banias O, Dragan F, Volosencu C, Dranga O (2007) Malicious node detection in wireless senser networks using an autoregression technique. In: 3rd international conference on networking and services, Athens, p.83
5.
Zurück zum Zitat Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless senser netowkr using weighted trust evaluation. In: Proc. of spring simulations multiconference, Ottawa, pp.836–843 Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless senser netowkr using weighted trust evaluation. In: Proc. of spring simulations multiconference, Ottawa, pp.836–843
6.
Zurück zum Zitat Ju L, Li H, Liu Y, Xue W, Li K, Chi Z (2010) An improved intrustion detection scheme based on weighted trust evaluation for wireless sensor networks. In: Proc. of the 5th international conference on ubiquitous information technology and applications(CUTE), Sanya, pp.1–6 Ju L, Li H, Liu Y, Xue W, Li K, Chi Z (2010) An improved intrustion detection scheme based on weighted trust evaluation for wireless sensor networks. In: Proc. of the 5th international conference on ubiquitous information technology and applications(CUTE), Sanya, pp.1–6
7.
Zurück zum Zitat Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. In: IEEE wireless communications Volume 11, Issue 1, IEEE Press, pp.38–47 Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. In: IEEE wireless communications Volume 11, Issue 1, IEEE Press, pp.38–47
8.
Zurück zum Zitat Han IS, Ryou H-B, Kang S-J (2006) Multi-path security-aware routing protocol mechanism for ad hoc network. In: Conference of ICHIT, 2006 international conference on hybrid information technology-Vol 1(ICHIT’06), pp.620–626 Han IS, Ryou H-B, Kang S-J (2006) Multi-path security-aware routing protocol mechanism for ad hoc network. In: Conference of ICHIT, 2006 international conference on hybrid information technology-Vol 1(ICHIT’06), pp.620–626
9.
Zurück zum Zitat Marti S et al. (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th annual international conference on Mobile computing and networking. ACM, p. 255–265 Marti S et al. (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th annual international conference on Mobile computing and networking. ACM, p. 255–265
Metadaten
Titel
A node management scheme for stable P2P service in mobile ad-hoc networks
verfasst von
Hyun-Jong Cha
Ho-Kyung Yang
Yong-Ho Kim
Publikationsdatum
01.05.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2016
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0392-5

Weitere Artikel der Ausgabe 3/2016

Peer-to-Peer Networking and Applications 3/2016 Zur Ausgabe