Anonymous Ad Hoc Network Performance Degradation Analysis in the Presence of Selfish
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Wireless Ad Hoc networks are characterized by dynamic change in topology, infrastructureless architecture and creation of a network on the fly. Being wireless and co-operative in nature Ad Hoc networks are more prone to security breaches compared to their wired counterparts in all layers of the network. Most security protocols do not address the anonymity issues which can be gathered by a passive eavesdropper who can gather node identity, node location and other network information. Another issue that will affect an Ad hoc network is the non co-operation of nodes which could be selfish or malicious. In this paper we investigate the performance degradation of a dynamic anonymous ad hoc network with various degrees of selfishness. The results obtained are compared with all nodes co- operating and with all selfish nodes eliminated in the network.
Authors and Affiliations
R. Kalpana , Dr. N. Rengarajan
Security Management System for Oilfield Based on GSM Technology
Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for the oil thefting, power failure, temperature range checking, tilt checking of...
Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis
This paper discuss various opportunistic routing algorithm which is based on broadcast nature of opportunistic network and also provide novel solution of routing which have less data loss. This research work proposed bro...
Content Aware Media Retargeting for still images using Seam Carving
When changing height and width of image traditional techniques for image resizing are oblivious to the content of image. A simple operator seam carving is used for image and video retargeting. This seam carving operator...
Study on the Customer targeting using Association Rule Mining
Data mining is one of the widest area where many researches takes place to mine desired and hidden data. There are many different approaches to find the hidden data. This paper deals with Frequent Pattern growth algorith...
An Analysis of Checkpointing Algorithms for Distributed Mobile Systems
Distributed snapshots are an important building block for istributed systems, and are useful for constructing efficient checkpointing protocols, among other uses. Direct application of these algorithms to mobile systems...