Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2016

01-05-2016

A node management scheme for stable P2P service in mobile ad-hoc networks

Authors: Hyun-Jong Cha, Ho-Kyung Yang, Yong-Ho Kim

Published in: Peer-to-Peer Networking and Applications | Issue 3/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Corson S, Macker J (1998) Mobile ad hoc Networking(MANET). In: Proc. of ACM SIGMOBILE mobile computing and Communications Review Volume 2 Issue 1, 9–14 Corson S, Macker J (1998) Mobile ad hoc Networking(MANET). In: Proc. of ACM SIGMOBILE mobile computing and Communications Review Volume 2 Issue 1, 9–14
2.
go back to reference Perkins CE (2008) Mobile ad hoc networking. In: Addison-Wessley Professional Perkins CE (2008) Mobile ad hoc networking. In: Addison-Wessley Professional
3.
go back to reference Corson S, Macker J, Batsell S (1996) Architectural considerrations for mobile mesh networking. In: Proc. of military communication conference. IEEE Press, pp.225–229 Corson S, Macker J, Batsell S (1996) Architectural considerrations for mobile mesh networking. In: Proc. of military communication conference. IEEE Press, pp.225–229
4.
go back to reference Curiac DI, Banias O, Dragan F, Volosencu C, Dranga O (2007) Malicious node detection in wireless senser networks using an autoregression technique. In: 3rd international conference on networking and services, Athens, p.83 Curiac DI, Banias O, Dragan F, Volosencu C, Dranga O (2007) Malicious node detection in wireless senser networks using an autoregression technique. In: 3rd international conference on networking and services, Athens, p.83
5.
go back to reference Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless senser netowkr using weighted trust evaluation. In: Proc. of spring simulations multiconference, Ottawa, pp.836–843 Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless senser netowkr using weighted trust evaluation. In: Proc. of spring simulations multiconference, Ottawa, pp.836–843
6.
go back to reference Ju L, Li H, Liu Y, Xue W, Li K, Chi Z (2010) An improved intrustion detection scheme based on weighted trust evaluation for wireless sensor networks. In: Proc. of the 5th international conference on ubiquitous information technology and applications(CUTE), Sanya, pp.1–6 Ju L, Li H, Liu Y, Xue W, Li K, Chi Z (2010) An improved intrustion detection scheme based on weighted trust evaluation for wireless sensor networks. In: Proc. of the 5th international conference on ubiquitous information technology and applications(CUTE), Sanya, pp.1–6
7.
go back to reference Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. In: IEEE wireless communications Volume 11, Issue 1, IEEE Press, pp.38–47 Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. In: IEEE wireless communications Volume 11, Issue 1, IEEE Press, pp.38–47
8.
go back to reference Han IS, Ryou H-B, Kang S-J (2006) Multi-path security-aware routing protocol mechanism for ad hoc network. In: Conference of ICHIT, 2006 international conference on hybrid information technology-Vol 1(ICHIT’06), pp.620–626 Han IS, Ryou H-B, Kang S-J (2006) Multi-path security-aware routing protocol mechanism for ad hoc network. In: Conference of ICHIT, 2006 international conference on hybrid information technology-Vol 1(ICHIT’06), pp.620–626
9.
go back to reference Marti S et al. (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th annual international conference on Mobile computing and networking. ACM, p. 255–265 Marti S et al. (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th annual international conference on Mobile computing and networking. ACM, p. 255–265
Metadata
Title
A node management scheme for stable P2P service in mobile ad-hoc networks
Authors
Hyun-Jong Cha
Ho-Kyung Yang
Yong-Ho Kim
Publication date
01-05-2016
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2016
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0392-5

Other articles of this Issue 3/2016

Peer-to-Peer Networking and Applications 3/2016 Go to the issue

Premium Partner