CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Trusted Cooperative Caching Scheme in Ad-hoc Networks

by Dinesh Singh Baghel, Sweta Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 4
Year of Publication: 2012
Authors: Dinesh Singh Baghel, Sweta Jain
10.5120/7336-0057

Dinesh Singh Baghel, Sweta Jain . Trusted Cooperative Caching Scheme in Ad-hoc Networks. International Journal of Computer Applications. 48, 4 ( June 2012), 17-20. DOI=10.5120/7336-0057

@article{ 10.5120/7336-0057,
author = { Dinesh Singh Baghel, Sweta Jain },
title = { Trusted Cooperative Caching Scheme in Ad-hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 4 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number4/7336-0057/ },
doi = { 10.5120/7336-0057 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:43:13.103510+05:30
%A Dinesh Singh Baghel
%A Sweta Jain
%T Trusted Cooperative Caching Scheme in Ad-hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 4
%P 17-20
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper investigates about the cooperative caching scheme which allows sharing their cache memory spaces among different node in ad-hoc network. We have applied trust model in cooperative caching which prevents malicious node from taking part in caching scenario and hence improves the reliability of the network. As routing protocol does not bother about the data accessibility and availability, instead their work mainly focus on finding the optimal route between the source and destination. To make routing more useful and reliable trust parameter can be used and to improve the data availability caching can be used. In this paper we apply the trust relationship among the nodes, and according to this trust relationship we take decision whether to make that node as a caching node or consider that node as a future threat in the network. Using this model, we can take more advantage of caching technique by neglecting the overhead generated by such malicious node.

References
  1. Ge-Ming Chiu and Cheng-Ru Young, "Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks", IEEE TRANSACTIONS ON MOBILE COMPUTING, Volume:8, NO. 3 MARCH 2009.
  2. L. Yin and G. Cao, ""Supporting Cooperative Caching in Ad Hoc Networks," Proc. IEEE INFOCOM 2004, pp. 2537-2547, 2004.
  3. L. Yin and G. Cao, "Supporting Cooperative Caching in Ad Hoc Networks," TRANSACTIONS ON MOBILE COMPUTING, Volume: 5, no. 1, pp. 77-89, Jan. 2006.
  4. C. -Y. Chow, H. V. Leong, and A. Chan, "Peer-to-Peer Cooperative Caching in Mobile Environments", Proc. 24th Int'l Conf. Distributed Computing Systems Workshops (ICDCSW '04), pp. 528-533, 2004.
  5. Chow, H. V. Leong, and A. Chan, "Cache Signatures for Peer to-Peer Cooperative Caching in Mobile Environments," Proc. 18th Int'l Conf. Advanced Information Networking and Applications (AINA '04), pp. 96-101, 2004.
  6. Chi-Yin Chow; Hong Va Leong; A. T. S Chan, "GroCoca: Group-Based Peer-to-Peer Cooperative Caching in Mobile Environment" IEEE TRANSACTIONS Volume: 25, issue 1, pp 179-191, 2007.
  7. Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," IEEE Infocom, April 2003.
  8. H. Hubaux, L. Buttyan and Capkun, "The Quest for Security in Mobile Ad Hoc Networks," ACM MobiHoc, pp. 146–155, 2001.
  9. W. Zhang, L. Yin and G. Cao, "Secure Cooperative Cache Based Data Access in Ad Hoc Networks," NSF International Workshop on Theoretical and Algorithmic Aspects of Wireless Ad Hoc, Sensor, and Peer-to-Peer Networks, June 2004.
  10. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, Aug. 2000.
  11. L. Zhou and Z. Haas, "Securing Ad-Hoc Networks," IEEE Network, Volume: 13, no. 6, pp. 24–30, November/December 1999.
  12. A. Perrig, R. Canetti, J. D. Tyger and D. Song, "The TESLA Broadcast Authentication Protocol," In CryptoBytes, Volume: 5, No. 2, Summer/Fall 2002, pp. 2-13.
  13. P. Cao and C. Liu, "Maintaining Strong Cache Consistency in the World-Wide Web," Proceedings of the 17th International Conference on Distributed Computing Systems, Page(s): 12 – 21, 1997.
  14. Naveen Chauhan, L. K. Awasthi, N. Chand, "Cooperative Data Caching with Prefetching in Mobile Ad-hoc Network", AH-ICI 2009 First Asian Himalayas International Conference, 2009.
  15. G. Cao, L. Yin, and C. Das, "Cooperative Cache-Based Data Access in Ad-Hoc Networks," IEEE TRANSACTIONS, Volume: 37, Issue: 2, pp. 32–39, Feb. 2004.
  16. Ihn-Han Bae,Stephan Olariu, "Design and Evaluation of a Fuzzy Cooperative Caching Scheme for MANETs", 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010, Page(s): 1 - 5.
  17. P. Kuppusamy, Dr. K. Thirunavukkarasu and Dr. B. Kalaavathi, "A Review of Cooperative Caching Strategies in Mobile Ad Hoc Networks", International Journal of Computer Applications (0975 – 8887) Volume: 29, No. 11, September 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Caching Cooperative Caching Trust Cache Consistency