Skip to main content
Top
Published in: Wireless Personal Communications 2/2013

01-11-2013

A Novel Secure Scheme For Wireless Ad Hoc Network

Authors: Seung-Jae Yoo, Dong-Hwi Lee, Hwan-Seok Yang

Published in: Wireless Personal Communications | Issue 2/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Performance of data access is quite degraded in wireless mobile network due to limited resources and low bandwidth. Cache technique is one of widely used technique to improve performance of data search. But, it has vulnerability easily exposed to many attacks. In this paper, we propose a technique which prevents modification of cache data from malicious node and provides efficient cache. In the proposed technique, member key is used in order to prevent malicious nodes from joining in network. Cluster head is elected based on reliability value and the number of connection after MANET is divided into clusters. It evaluates reliability of MN based on received reliability value from neighbor nodes and issues member key. MNs request cache using member key and transmit data. Cluster head manages two tables to provide efficient cache. Transmission delay and overhead is reduced by doing so. We confirmed superior performance of the proposed technique through the experiment results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Frodigh, M., Johansson, P., & Larsson, L. (2000). Wireless ad hoc networking. Erricsson Review, 4. Frodigh, M., Johansson, P., & Larsson, L. (2000). Wireless ad hoc networking. Erricsson Review, 4.
2.
go back to reference Kucuk, K., & Kavak, A. (2013). Connectivity analysis for wireless sensor networks with antenna array integrated central node. Wireless Personal Communications, 1–11. Kucuk, K., & Kavak, A. (2013). Connectivity analysis for wireless sensor networks with antenna array integrated central node. Wireless Personal Communications, 1–11.
3.
go back to reference Lee, S., Su, W., & Gerla, M. (2002). On-demand multicast routing protocol in multihop wireless mobile networks. ACM/Kluwer Mobile Networks and Application (MONET), 6, 441–453.CrossRef Lee, S., Su, W., & Gerla, M. (2002). On-demand multicast routing protocol in multihop wireless mobile networks. ACM/Kluwer Mobile Networks and Application (MONET), 6, 441–453.CrossRef
4.
go back to reference Bsoul, M., Al-Khasawneh, A., Abdallah, A. E., Abdallah, E. E., & Obeidat, I. (2013). An energy-efficient threshold-based clustering protocol for wireless sensor networks. Wireless Personal Communications, 70(1), 99–112.CrossRef Bsoul, M., Al-Khasawneh, A., Abdallah, A. E., Abdallah, E. E., & Obeidat, I. (2013). An energy-efficient threshold-based clustering protocol for wireless sensor networks. Wireless Personal Communications, 70(1), 99–112.CrossRef
5.
go back to reference Du, Y., & Gupta, S. (2009). Improving on-demand data access efficiency in MANET with cooperative caching. In Ad Hoc Networks Elsevier, pp. 579–598. Du, Y., & Gupta, S. (2009). Improving on-demand data access efficiency in MANET with cooperative caching. In Ad Hoc Networks Elsevier, pp. 579–598.
6.
go back to reference Lim, S., Lee, W. C., Cao, G., & Das, C. R. (2004). Performance comparison of cache invalidation strategies for internet based mobile Ad hoc networks. In Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 104–204. Lim, S., Lee, W. C., Cao, G., & Das, C. R. (2004). Performance comparison of cache invalidation strategies for internet based mobile Ad hoc networks. In Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 104–204.
7.
go back to reference Lim, S., Lee, W. C., Cao, G., & Das, C. R. (2006). A novel caching scheme for improving internet based mobile ad hoc networks performance. Elsevier Journal of Ad Hoc Networks, 2, 225–239.CrossRef Lim, S., Lee, W. C., Cao, G., & Das, C. R. (2006). A novel caching scheme for improving internet based mobile ad hoc networks performance. Elsevier Journal of Ad Hoc Networks, 2, 225–239.CrossRef
8.
go back to reference Hong, L., Zhou, G., Liu, B., & Son, S. (2013). Continuous location dependent queries in mobile wireless sensor networks. Wireless Personal Communications, 68(1), 153–173. Hong, L., Zhou, G., Liu, B., & Son, S. (2013). Continuous location dependent queries in mobile wireless sensor networks. Wireless Personal Communications, 68(1), 153–173.
9.
go back to reference Chand, N., & Joshi, R. C. (2011). A cooperative caching strategy in mobile ad hoc networks based on clusters. International Journal of Mobile Computing and Multimedia Communications, 3, 20–35. Chand, N., & Joshi, R. C. (2011). A cooperative caching strategy in mobile ad hoc networks based on clusters. International Journal of Mobile Computing and Multimedia Communications, 3, 20–35.
10.
go back to reference Huang, Y., Cao, J., Jin, B., Tao, X., & Lu, J. (2010). Flexible cache consistency maintenance over wireless ad hoc network. IEEE Transaction on Parallel and Distributed Systems, 12, 1150–1161.CrossRef Huang, Y., Cao, J., Jin, B., Tao, X., & Lu, J. (2010). Flexible cache consistency maintenance over wireless ad hoc network. IEEE Transaction on Parallel and Distributed Systems, 12, 1150–1161.CrossRef
11.
go back to reference Mishra, A. K., & Turuk, A. K. (2013). A zone-based node replica detection scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 601–621.CrossRef Mishra, A. K., & Turuk, A. K. (2013). A zone-based node replica detection scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 601–621.CrossRef
12.
go back to reference Xu, J., Tang, X., & Lee, D. (2003). Performance analysis of location-dependent cache invalidation schemes for mobile environments. IEEE Transaction on Knowledge and Data Engineering, 15, 474–488.CrossRef Xu, J., Tang, X., & Lee, D. (2003). Performance analysis of location-dependent cache invalidation schemes for mobile environments. IEEE Transaction on Knowledge and Data Engineering, 15, 474–488.CrossRef
Metadata
Title
A Novel Secure Scheme For Wireless Ad Hoc Network
Authors
Seung-Jae Yoo
Dong-Hwi Lee
Hwan-Seok Yang
Publication date
01-11-2013
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2013
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1230-9

Other articles of this Issue 2/2013

Wireless Personal Communications 2/2013 Go to the issue