CFP last date
20 January 2025
Reseach Article

Selfish Less Replica Allocation in MANET

by Devi Selvam, Tamilarasi. G
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 19
Year of Publication: 2013
Authors: Devi Selvam, Tamilarasi. G
10.5120/10576-5660

Devi Selvam, Tamilarasi. G . Selfish Less Replica Allocation in MANET. International Journal of Computer Applications. 63, 19 ( February 2013), 33-37. DOI=10.5120/10576-5660

@article{ 10.5120/10576-5660,
author = { Devi Selvam, Tamilarasi. G },
title = { Selfish Less Replica Allocation in MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 19 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number19/10576-5660/ },
doi = { 10.5120/10576-5660 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:47.652687+05:30
%A Devi Selvam
%A Tamilarasi. G
%T Selfish Less Replica Allocation in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 19
%P 33-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the protocols and algorithms used in MANET, are assuming that all mobile nodes cooperate fully with the functionalities of the network. But some nodes are cooperate partially or not at all cooperating. Network performance and data accessibility, accessing time, query delay are affected by these selfish nodes. The discussion of this paper is about, representing a Replica server which solves the selfishness. The Replica server monitors and maintains the status of all mobile nodes in the network. If it finds any selfish node in the shortest path between source and destination, the replica server will analyze the reason for selfishness and it finds solution. The conducted simulations demonstrate the proposed approach based on proxy method which outperforms in terms of network parameters such as accessing data, time and cost and also it improves the network performance of MANET.

References
  1. Jae-Ho Choi, Kyu-Sun Shim, SangKeun Lee, and Kun-Lung Wu, Fellow, IEEE, "Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network" IEEE Transactions On Mobile Computing, Vol. 11, No. 2, February 2012.
  2. K. Balakrishnan, J. Deng, and P. K. Varshney, "TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks," Proc. IEEE Wireless Comm. and Networking, pp. 2137-2142, 2005.
  3. Shailender Gupta, C. K. Nagpal and Charu Singla, "IMPACT OF SELFISH NODE CONCENTRATION IN MANETS" International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 2, April 2011.
  4. Amit Saxena, J. L Rana, "Analysis of Selfish and Malicious Nodes on DSR Based Ocean Protocol in MANET", TECHNIA International Journal of Computing Science and Communication Technologies, VOL. 3, NO. 1, July 2010. (ISSN 0974-3375).
  5. Yang Zhang, Student Member, IEEE, Liangzhong Yin, Jing Zhao, and Guohong Cao, Fellow, IEEE, "Balancing the Tradeoffs between Query Delay and Data Availability in MANETs", IEEE Transactions On Parallel And Distributed Systems, Vol. X, No. X, January 20xx.
  6. Enrique Hern´andez-Orallo, Manuel D. Serrat, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni, "Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog", IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 5, MAY 2012.
  7. Debdutta Barman Roy and Rituparna Chaki, "MADSN: Mobile Agent Based Detection of Selfish Node in MANET", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 4, August 2011.
  8. S. Usha, Member, IACSIT and S. Radha, "Multi Hop Acknowledgement Scheme based Selfish Node Multi Hop Acknowledgement Scheme based Selfish Node", International Journal of Computer and Electrical Engineering, Vol. 3, No. 4, August 2011.
  9. Rajeev Kumar, and Prashant Kumar, "Replica Allocation Technique Based on Clusters for MANETs" International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE'2012) March 24-25, 2012 Dubai.
  10. Rashid Azeem and Muhammad Ishfaq Ahmad Khan, "Techniques about Data Replication for Mobile Ad-hoc Network Databases", International Journal Of Multidisciplinary Sciences And Engineering, Vol. 3, No. 5, May 2012.
  11. Hongxun Liu, José G. Delgado-Frias, And Sirisha Medidi, "Using A Two-Timer Scheme To Detect Selfish Nodes In Mobile Ad-Hoc Networks", proceedings of the sixth IASTED.
  12. Zaiba Ishrat, "Security issues, challenges & solution in MANET", IJCST Vol. 2, Iss ue 4, Oct . - Dec. 2011 ISSN : 0976-8491 (Online) | ISSN : 2229-4333(Print).
  13. Dipali Koshti, Supriya Kamoji, "Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-4, September 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANET data accessibility accessing time query delay selfish nodes Replica server proxy method