Fully selfish node detection, deletion and secure replica allocation over MANET

In a mobile ad hoc network, several replica allocation techniques have been proposed to minimize performance degradation. If the nodes in a MANET together have sufficient memory space to hold both all the replicas and the original data. Some nodes may act selfishly, selfish nodes decide only to cooperate partially, or not at all, with other node (that is., Non-cooperative actions of misbehavior are usually termed as selfishness, which is notably different from malicious behavior). Selfish node may not share its own memory space to store replica for the benefits of other nodes. To develop a selfish node detection algorithm that considers partial selfishness and novel replica allocation technique to properly cope with selfish replica allocation. Selfish replica allocation refers to a node's non-cooperative action, such that the node refuses to cooperate fully in sharing its memory space with other nodes. Secure Hill cipher algorithm is to provide the security in replica data. Selfish replica allocation techniques significantly reduce communication cost and Simulation result show fully selfish node detection time, fully selfish node deletion time.

[1]  Xiang Li,et al.  Data Caching in Selfish MANETs , 2005, ICCNMC.

[2]  Luís E. T. Rodrigues,et al.  Friends and foes: preventing selfishness in open mobile ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[3]  K. N. Anandhapriya HANDLING SELFISHNESS IN REPLICA ALLOCATION OVER A MANET , 2013 .

[4]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[5]  D. Hales From selfish nodes to cooperative networks - emergent link-based incentives in peer-to-peer networks , 2004 .

[6]  David Hales,et al.  From selfish nodes to cooperative networks - emergent link-based incentives in peer-to-peer networks , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[7]  Takahiro Hara,et al.  Effective replica allocation in ad hoc networks for improving data accessibility , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).