SlideShare a Scribd company logo
1 of 4
Download to read offline
© 2016, IJCERT All Rights Reserved Page | 165
International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 165-168 ISSN (O): 2349-7084
Handling Selfishness in Replica Allocation
over a Mobile Ad-Hoc Network
Laxmi R. Shinde, Trupti A. Jadhav, Prajakta R. Baviskar
Abstract:- MANET is a collection of mobile devices that can communicate with each other without the use centralized
administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the
regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are
connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different
networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of
performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node
which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures
that performance is not degraded.
Keywords – Replica allocation, Selfish node, Network partitioning.
——————————  ——————————
1. INTRODUCTION
Mobile ad hoc networks (MANETs) have attracted a lot
of attention due to the popularity of mobile devices
and the advances in wireless communication
technologies [10], [11], [7]. A MANET is a peer-to-peer
multi hop mobile wireless network that has neither a
fixed infrastructure nor a central server. Each node in a
MANET acts as a router, and communicates with each
other. A large variety of MANET applications have
been developed. For example, a MANET can be used in
special situations, where installing infrastructure may
be difficult, or even infeasible, such as a battlefield or a
disaster area. A mobile peer-to-peer file sharing system
is another interesting MANET application
[12].Network partitions can occur frequently, since
nodes move freely in a MANET, causing some data to
be often inaccessible to some of the nodes. Hence, data
accessibility is often an important performance metric
in a MANET [9]. Data are usually replicated at nodes,
other than the original owners, to increase data
accessibility to cope with frequent network partitions.
A considerable amount of research has recently been
proposed for replica allocation in a MANET [9] [10]. In
general, replication can simultaneously improve data
accessibility and reduce query delay, i.e., query
response time, if the mobile nodes in a MANET
together have sufficient memory space to hold both all
the replicas and the original data. For example, the
response time of a query can be substantially reduced,
if the query accesses a data item that has a locally
stored replica. However, there is often a trade-off
between data accessibility and query delay, since most
nodes in a MANET have only limited memory space.
For example, a node may hold a part of the frequently
accessed data items locally to reduce its own query
delay. However, if there is only limited memory space
and many of the nodes hold the same replica locally,
then some data items would be replaced and missing.
Thus, the overall data accessibility would be decreased.
Hence, to maximize data accessibility, a node should
not hold the same replica that is also held by many
other nodes. However, this will increase its own query
Available online at: www.ijcert.org
Laxmi R. Shinde et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 165-168
© 2016, IJCERT All Rights Reserved Page | 166
delay.A node may act selfishly, i.e., using its limited
resource only for its own benefit, since each node in a
MANET has resource constraints, such as battery and
storage limitations. A node would like to enjoy the
benefits provided by the resources of other nodes, but
it may not make its own resource available to help
others. Such selfish behavior can potentially lead to a
wide range of problems for a MANET. Existing
research on selfish behaviors in a MANET mostly focus
on network issues [2], [8], [6]. For example, selfish
nodes may not transmit data to others to conserve their
own batteries. Although network issues are important
in a MANET, replica allocation is also crucial, since the
ultimate goal of using a MANET is to provide data
services to users.
2. RELATED WORK
Takahiro Hara stated the three replica allocation
methods that are used to improve data accessibility by
replicating data items on mobile hosts. In these three
methods, the access frequency from mobile hosts to
each data item and the status of the network
connection is taken into consideration. Jaydip Sen1 and
Kaustav Goswami2 presented an Algorithm for
detection of selfish nodes in a WMN(Wireless Mesh
network).Wireless mesh networks (WMNs) are
evolving as a key technology for next-generation
wireless networks showing raid progress and
numerous applications .However the throughput of a
WMN may be severely degraded due to presence of
some selfish routers therefore this paper introduces the
use of statistical theory of inference for reliable
clustering of the nodes and is based on local
observations by the nodes. Jim Solomon Raja.D,
Immanuel John Raja.J gave a new mechanism that
minimizes the problem of selfish nodes with the help of
Credit risk and Brain trapping function Model.
Including Degree of selfishness in allocating replicas
will considerably reduce communication cost and
produce high data accessibility. A collaborative
monitoring mechanism is also used to manage false
alarms. Simulation results shows that the proposed
system provides better detection efficiency, low false
positive and delay constraint. M. Manjula M.C.A, P.
Elango MCA, examined the impact of selfish nodes in a
mobile ad hoc network from the perspective of replica
allocation. This work was motivated by the fact that a
selfish replica allocation could lead to overall poor
MANET data accessibility. The strategies are inspired
by the real-world observations in economics in terms of
credit risk and in human friendship management in
terms of choosing ones friends completely at ones own
circumspection. The notion of credit risk from
economics is to detect nodes that behave selfishly. Each
and every node in a MANET calculates credit risk
information on other connected nodes individually to
measure the degree of selfishness.
3. PROPOSED WORK
In a proposed system at a specific period, or relocation
period, each node executes the following procedures:-
-Each node detects the selfish nodes based on credit
risk scores.
-Each node makes its own (partial) topology graph and
builds its own SCF-tree by excluding selfish nodes.
-Based on SCF-tree, each node allocates replica in a
fully distributed manner.
3.1. ALGORITHM TO DETECT SELFISH
NODE:
00: At every relocation period
01: /* Ni detects selfish nodes with this algorithm */
02: detection(){
03: for (each connected node ){
04: if(nCRik< α)Nk is marked as non-selfish;
05: else Nk is marked as selfish;}
06: wait until replica allocation is done;
07: for (each connected node Nk){
08: if(Ni has allocated replica to Nk){
09 NDki =the number of allocated replica;
10: SSki = the total size of allocated replica;}
11: else{
12: NDik = 1;
13: SSik = the size of a data item;
14: } } }
3.2.ALGORITHM TO UPDATE SELFISH
FEATURE
00: At every query processing time
01: /* When Ni issues a query */
02: update_SF () {
03: while (during the predefined time ώ),
04: if (an expected node Nk serves the query)
Laxmi R. Shinde et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 165-168
© 2016, IJCERT All Rights Reserved Page | 167
05: decrease Pki ;
06: if (an unexpected node Nk serves the query){
07: ND j i= NDji + 1;
08: SSji= SSji+ (the size of a data item);
09: } }
10: if (an expected node Nk does not serve the query){
11: increase Pki;
12: NDki = NDki- 1;
13: SSki = SSki (the size of a data item);
14: } }
3.3.ALGORITHM TO BUILD SCF-TREE
00:/* Ni makes SCF-tree with a parameter , depth d*/
01: constructScfTree(){
02: append Ni to SCF-tree as the root node;
03: checkChildnodes (Ni);
04: return SCF-tree;}
05: Procedure checkChildnodes (Nj){
06: /* INajis a set of nodes that are adjacent nodes to Nj
*/
07: for (each node Na ЄIN aj){
08: if (distance between Na and the root >d )
09: continue;
10: else if (Na is an ancestor of Njin Tiscf)
11: continue;
12: else{ append Na to in Tiscfas a child of Nj;
13: checkChildnodes(Na); } } }
3.4.ALGORITHM TO ALLOCATE REPLICA
00: /* Ni executes this algorithm at relocation period */
01: replica_allocation(){
02: Li = make_priority(TiSCF) ;
03: for (each data item Є IDi),
04: if (Ms is not full)
05: allocate replica of the data to Ms ;
06: else{/* Ms is full */
07: allocate replica of the data to the target node;
08: /* the target node is selected from Li */
09: if (Mp is not full)
10: allocate replica of the data to Mp; } }
11: while (during a relocation period){
12: if (Nk requests for the allocation of Dq)
13: replica_allocation_for_others (Nk ,Dq); } }
14: Procedure make_priority (TiSCF) {
15: for (all vertices in TiSCF ){
16: select a vertex in TiSCF in order of BFS;
17: append the selected vertex id to Li; }
18: return Li ; }
19: Procedure replica_allocation_for_others(Nk ,Dq){
20: if (Nk is in TiSCFand Ni does not hold Dq){
21: if (Mp is not full) allocate Dq to Mp ;
22: else{/* Mp is full */
23: if(Ni holds any replica of local interest in Mp)
24: replace the replica with Dq ;
25: else{
26: /* Nh is the node with the highest nCRhi
among the nodes which allocated replica to Mp */
27: if (nCRhi>nCRik )
28: replace the replica requested by Nh with Dq;
29: } } } }
4. CONCLUSION
MANETS are used in various contexts like mobile
social networks, emergency deployment; intelligent
transportation systems etc. According to the viewpoint
of network, problem of selfish nodes from the replica
allocation has been addressed. This term is stated as
selfish replica allocation. The fact that a selfish replica
allocation could lead to overall poor data accessibility
in a MANET, so the proposed solution describes a
selfish node detection method and replica allocation
techniques to handle the selfish replica allocation
appropriately. The proposed strategies are inspired by
the real-world observations in economics in terms of
credit risk and in human friendship management in
terms of choosing one’s friends completely one’s own
discretion. We applied the notion of credit risk from
economics to detect selfish nodes. Every node in a
MANET calculates credit risk information on other
connected nodes individually to measure the degree of
selfishness.
5. FUTURE SCOPE
A selfish node is one that tries to utilize the network
using its limited resource only for its own benefit, since
each node in a MANET has resource constraints, such
as battery and storage limitations, it would like to enjoy
the benefits provided by the resources of other nodes,
but it may not make its own resource available to help
others. Such selfish behavior can potentially lead to a
wide range of problems for a MANET. The research is
currently going on the impact of different mobility
patterns. The proposed system improves the data
accessibility, reduces communication cost, and average
query delay and also to reduce the detection time of the
selfish nodes.
Laxmi R. Shinde et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 165-168
© 2016, IJCERT All Rights Reserved Page | 168
REFERENCES
[1] Handling Selfishness in Replica Allocation over a
Mobile Ad Hoc Network Jae-Ho Choi, Kyu-Sun Shim,
SangKeun Lee, and Kun-Lung Wu, Fellow, IEEE VOL. 11,
NO. 2, FEBRUARY 2012
[2] L. Anderegg and S. Eidenbenz, “Ad Hoc-VCG: A
Truthful and Cost-Efficient Routing Protocol for Mobile
Ad Hoc Networks with Selfish Agents,” Proc. ACM
MobiCom, pp. 245-259, 2003.
[3] K. Balakrishnan, J. Deng, and P.K. Varshney,
“TWOACK:
Preventing Selfishness in Mobile Ad Hoc Networks,”
Proc. IEEE Wireless Comm. and Networking, pp. 2137-
2142, 2005.
[4] B.-G. Chun, K. Chaudhuri, H. Wee, M. Barreno, C.H.
Papadimitriou, and J. Kubiatowicz, “Selfish Caching in
Distributed Systems A Game-Theoretic Analysis,” Proc.
ACM Symp. Principles of Distributed Computing, pp.
21-30, 2004.
[5] E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P.
Samarati, “Managing and Sharing Servents’ Reputations
in P2P Systems,” IEEE Trans. Knowledge and Data Eng.,
vol. 15, no. 4, pp. 840-854,July/Aug. 2003.
[6] Y. Liu and Y. Yang, “Reputation Propagation and
Agreement in Mobile Ad-Hoc Networks,” Proc. IEEE
Wireless Comm. And Networking Conf., pp. 1510-1515,
2003.
[7] S.-Y. Wu and Y.-T. Chang, “A User-Centered
Approach to Active Replica Management in Mobile
Environments,” IEEE Trans. Mobile Computing, vol. 5,
no. 11, pp. 1606-1619, Nov. 2006.
[8] D. Hales, “From Selfish Nodes to Cooperative
Networks -Emergent Link-Based Incentives in Peer-to-
Peer Network Proc.IEEE Int’l Conf. Peer-to-Peer
Computing, pp. 151-158, 2004.
[9] T. Hara, “Effective Replica Allocation in Ad Hoc
Networks for Improving Data Accessibility,” Proc.
IEEE INFOCOM, pp.1568- 1576, 2001.
[10] T. Hara and S.K. Madria, “Data Replication for
Improving Data Accessibility in Ad Hoc Networks,”
IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1515-
1532, Nov. 2006.
*11+ T. Hara and S.K. Madria, “Consistency Management
Strategies for Data Replication in Mobile Ad Hoc
Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 7,
pp. 950-967, July 2009.
[12] M. Li, W.-C. Lee, and A. Sivasubramaniam, “Efficient
Peer-to Peer Information Sharing over Mobile Ad Hoc
Networks,” Proc. World Wide Web (WWW) Workshop
Emerging Applications for Wireless and Mobile Access,
pp. 2-6, 2004.
[13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating
Routing Misbehavior in Mobile Ad hoc Networks,” Proc.
ACM MobiCom, pp. 255-265, 2000.
[14] Y. Yoo and D.P. Agrawal, “Why Does It Pay to be
Selfish in a MANET,” IEEE Wireless Comm., vol. 13, no.
6, pp. 87-97, Dec. 2006.

More Related Content

What's hot

Semantic Sensor Networks and Linked Stream Data
Semantic Sensor Networks and Linked Stream DataSemantic Sensor Networks and Linked Stream Data
Semantic Sensor Networks and Linked Stream DataOscar Corcho
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...1crore projects
 
Internet data mining 2006
Internet data mining   2006Internet data mining   2006
Internet data mining 2006raj_vij
 
Enchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor NetworksEnchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor Networksijsrd.com
 
From Sensor Data to Triples: Information Flow in Semantic Sensor Networks
From Sensor Data to Triples: Information Flow in Semantic Sensor NetworksFrom Sensor Data to Triples: Information Flow in Semantic Sensor Networks
From Sensor Data to Triples: Information Flow in Semantic Sensor NetworksNikolaos Konstantinou
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networkspaperpublications3
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksPvrtechnologies Nellore
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based onijp2p
 
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
 ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATANexgen Technology
 
Usage Patterns to Provision for Scientific Experiments in Clouds
Usage Patterns to Provision for Scientific Experiments in CloudsUsage Patterns to Provision for Scientific Experiments in Clouds
Usage Patterns to Provision for Scientific Experiments in CloudsEran Chinthaka Withana
 
Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Surveyiosrjce
 
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESA PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESijp2p
 

What's hot (14)

Semantic Sensor Networks and Linked Stream Data
Semantic Sensor Networks and Linked Stream DataSemantic Sensor Networks and Linked Stream Data
Semantic Sensor Networks and Linked Stream Data
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
 
Internet data mining 2006
Internet data mining   2006Internet data mining   2006
Internet data mining 2006
 
Enchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor NetworksEnchancing the Data Collection in Tree based Wireless Sensor Networks
Enchancing the Data Collection in Tree based Wireless Sensor Networks
 
From Sensor Data to Triples: Information Flow in Semantic Sensor Networks
From Sensor Data to Triples: Information Flow in Semantic Sensor NetworksFrom Sensor Data to Triples: Information Flow in Semantic Sensor Networks
From Sensor Data to Triples: Information Flow in Semantic Sensor Networks
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
 
Data collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networksData collection in multi application sharing wireless sensor networks
Data collection in multi application sharing wireless sensor networks
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based on
 
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
 ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
ON DISTRIBUTED FUZZY DECISION TREES FOR BIG DATA
 
C04511822
C04511822C04511822
C04511822
 
Usage Patterns to Provision for Scientific Experiments in Clouds
Usage Patterns to Provision for Scientific Experiments in CloudsUsage Patterns to Provision for Scientific Experiments in Clouds
Usage Patterns to Provision for Scientific Experiments in Clouds
 
Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Survey
 
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASESA PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
A PERMISSION BASED TREE-STRUCTURED APPROACH FOR REPLICATED DATABASES
 

Viewers also liked

Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYIJCERT
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessIJCERT
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingIJCERT
 
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceOBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceIJCERT
 
Cloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelCloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelIJCERT
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerIJCERT
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionIJCERT
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsIJCERT
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding IJCERT
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodIJCERT
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 

Viewers also liked (16)

Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
 
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceOBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
 
Cloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelCloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin Model
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling Power
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation Methods
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 

Similar to Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network

ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETsIOSR Journals
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...ijasuc
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...IOSR Journals
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
DistributeddatabasesforchallengednetVinoth Chandar
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Data repository for sensor network a data mining approach
Data repository for sensor network  a data mining approachData repository for sensor network  a data mining approach
Data repository for sensor network a data mining approachijdms
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...acijjournal
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Pvrtechnologies Nellore
 

Similar to Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network (20)

ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
 
Ch35473477
Ch35473477Ch35473477
Ch35473477
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Ax34298305
Ax34298305Ax34298305
Ax34298305
 
F1074547
F1074547F1074547
F1074547
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
 
Hm2413291336
Hm2413291336Hm2413291336
Hm2413291336
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Data repository for sensor network a data mining approach
Data repository for sensor network  a data mining approachData repository for sensor network  a data mining approach
Data repository for sensor network a data mining approach
 
C1804011117
C1804011117C1804011117
C1804011117
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
 

More from IJCERT

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodIJCERT
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetIJCERT
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetIJCERT
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueIJCERT
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...IJCERT
 
V3 i301
V3 i301V3 i301
V3 i301IJCERT
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationIJCERT
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceIJCERT
 
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.IJCERT
 

More from IJCERT (14)

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver Fatigue
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSE
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
 
V3 i301
V3 i301V3 i301
V3 i301
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold Preference
 
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network

  • 1. © 2016, IJCERT All Rights Reserved Page | 165 International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 165-168 ISSN (O): 2349-7084 Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network Laxmi R. Shinde, Trupti A. Jadhav, Prajakta R. Baviskar Abstract:- MANET is a collection of mobile devices that can communicate with each other without the use centralized administration. One of the interesting application of MANET is File Sharing. File Sharing in MANET is similar to that of the regular file sharing, what makes the difference is it allow user to access the data or memory of that nodes only which are connected to it. This File sharing many a times leads to Network Partitioning, i.e dividing a network into two different networks .Due to which the nodes may act selfishly. The selfishness of some of the nodes may lead in reduction of performance in terms of accessing data. The proposed system will use the SCF-tree technique for building a tree of Node which will share their data in terms of Replica, and as a result it detects the selfish node in the network. The replica insures that performance is not degraded. Keywords – Replica allocation, Selfish node, Network partitioning. ——————————  —————————— 1. INTRODUCTION Mobile ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies [10], [11], [7]. A MANET is a peer-to-peer multi hop mobile wireless network that has neither a fixed infrastructure nor a central server. Each node in a MANET acts as a router, and communicates with each other. A large variety of MANET applications have been developed. For example, a MANET can be used in special situations, where installing infrastructure may be difficult, or even infeasible, such as a battlefield or a disaster area. A mobile peer-to-peer file sharing system is another interesting MANET application [12].Network partitions can occur frequently, since nodes move freely in a MANET, causing some data to be often inaccessible to some of the nodes. Hence, data accessibility is often an important performance metric in a MANET [9]. Data are usually replicated at nodes, other than the original owners, to increase data accessibility to cope with frequent network partitions. A considerable amount of research has recently been proposed for replica allocation in a MANET [9] [10]. In general, replication can simultaneously improve data accessibility and reduce query delay, i.e., query response time, if the mobile nodes in a MANET together have sufficient memory space to hold both all the replicas and the original data. For example, the response time of a query can be substantially reduced, if the query accesses a data item that has a locally stored replica. However, there is often a trade-off between data accessibility and query delay, since most nodes in a MANET have only limited memory space. For example, a node may hold a part of the frequently accessed data items locally to reduce its own query delay. However, if there is only limited memory space and many of the nodes hold the same replica locally, then some data items would be replaced and missing. Thus, the overall data accessibility would be decreased. Hence, to maximize data accessibility, a node should not hold the same replica that is also held by many other nodes. However, this will increase its own query Available online at: www.ijcert.org
  • 2. Laxmi R. Shinde et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 165-168 © 2016, IJCERT All Rights Reserved Page | 166 delay.A node may act selfishly, i.e., using its limited resource only for its own benefit, since each node in a MANET has resource constraints, such as battery and storage limitations. A node would like to enjoy the benefits provided by the resources of other nodes, but it may not make its own resource available to help others. Such selfish behavior can potentially lead to a wide range of problems for a MANET. Existing research on selfish behaviors in a MANET mostly focus on network issues [2], [8], [6]. For example, selfish nodes may not transmit data to others to conserve their own batteries. Although network issues are important in a MANET, replica allocation is also crucial, since the ultimate goal of using a MANET is to provide data services to users. 2. RELATED WORK Takahiro Hara stated the three replica allocation methods that are used to improve data accessibility by replicating data items on mobile hosts. In these three methods, the access frequency from mobile hosts to each data item and the status of the network connection is taken into consideration. Jaydip Sen1 and Kaustav Goswami2 presented an Algorithm for detection of selfish nodes in a WMN(Wireless Mesh network).Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing raid progress and numerous applications .However the throughput of a WMN may be severely degraded due to presence of some selfish routers therefore this paper introduces the use of statistical theory of inference for reliable clustering of the nodes and is based on local observations by the nodes. Jim Solomon Raja.D, Immanuel John Raja.J gave a new mechanism that minimizes the problem of selfish nodes with the help of Credit risk and Brain trapping function Model. Including Degree of selfishness in allocating replicas will considerably reduce communication cost and produce high data accessibility. A collaborative monitoring mechanism is also used to manage false alarms. Simulation results shows that the proposed system provides better detection efficiency, low false positive and delay constraint. M. Manjula M.C.A, P. Elango MCA, examined the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. This work was motivated by the fact that a selfish replica allocation could lead to overall poor MANET data accessibility. The strategies are inspired by the real-world observations in economics in terms of credit risk and in human friendship management in terms of choosing ones friends completely at ones own circumspection. The notion of credit risk from economics is to detect nodes that behave selfishly. Each and every node in a MANET calculates credit risk information on other connected nodes individually to measure the degree of selfishness. 3. PROPOSED WORK In a proposed system at a specific period, or relocation period, each node executes the following procedures:- -Each node detects the selfish nodes based on credit risk scores. -Each node makes its own (partial) topology graph and builds its own SCF-tree by excluding selfish nodes. -Based on SCF-tree, each node allocates replica in a fully distributed manner. 3.1. ALGORITHM TO DETECT SELFISH NODE: 00: At every relocation period 01: /* Ni detects selfish nodes with this algorithm */ 02: detection(){ 03: for (each connected node ){ 04: if(nCRik< α)Nk is marked as non-selfish; 05: else Nk is marked as selfish;} 06: wait until replica allocation is done; 07: for (each connected node Nk){ 08: if(Ni has allocated replica to Nk){ 09 NDki =the number of allocated replica; 10: SSki = the total size of allocated replica;} 11: else{ 12: NDik = 1; 13: SSik = the size of a data item; 14: } } } 3.2.ALGORITHM TO UPDATE SELFISH FEATURE 00: At every query processing time 01: /* When Ni issues a query */ 02: update_SF () { 03: while (during the predefined time ώ), 04: if (an expected node Nk serves the query)
  • 3. Laxmi R. Shinde et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 165-168 © 2016, IJCERT All Rights Reserved Page | 167 05: decrease Pki ; 06: if (an unexpected node Nk serves the query){ 07: ND j i= NDji + 1; 08: SSji= SSji+ (the size of a data item); 09: } } 10: if (an expected node Nk does not serve the query){ 11: increase Pki; 12: NDki = NDki- 1; 13: SSki = SSki (the size of a data item); 14: } } 3.3.ALGORITHM TO BUILD SCF-TREE 00:/* Ni makes SCF-tree with a parameter , depth d*/ 01: constructScfTree(){ 02: append Ni to SCF-tree as the root node; 03: checkChildnodes (Ni); 04: return SCF-tree;} 05: Procedure checkChildnodes (Nj){ 06: /* INajis a set of nodes that are adjacent nodes to Nj */ 07: for (each node Na ЄIN aj){ 08: if (distance between Na and the root >d ) 09: continue; 10: else if (Na is an ancestor of Njin Tiscf) 11: continue; 12: else{ append Na to in Tiscfas a child of Nj; 13: checkChildnodes(Na); } } } 3.4.ALGORITHM TO ALLOCATE REPLICA 00: /* Ni executes this algorithm at relocation period */ 01: replica_allocation(){ 02: Li = make_priority(TiSCF) ; 03: for (each data item Є IDi), 04: if (Ms is not full) 05: allocate replica of the data to Ms ; 06: else{/* Ms is full */ 07: allocate replica of the data to the target node; 08: /* the target node is selected from Li */ 09: if (Mp is not full) 10: allocate replica of the data to Mp; } } 11: while (during a relocation period){ 12: if (Nk requests for the allocation of Dq) 13: replica_allocation_for_others (Nk ,Dq); } } 14: Procedure make_priority (TiSCF) { 15: for (all vertices in TiSCF ){ 16: select a vertex in TiSCF in order of BFS; 17: append the selected vertex id to Li; } 18: return Li ; } 19: Procedure replica_allocation_for_others(Nk ,Dq){ 20: if (Nk is in TiSCFand Ni does not hold Dq){ 21: if (Mp is not full) allocate Dq to Mp ; 22: else{/* Mp is full */ 23: if(Ni holds any replica of local interest in Mp) 24: replace the replica with Dq ; 25: else{ 26: /* Nh is the node with the highest nCRhi among the nodes which allocated replica to Mp */ 27: if (nCRhi>nCRik ) 28: replace the replica requested by Nh with Dq; 29: } } } } 4. CONCLUSION MANETS are used in various contexts like mobile social networks, emergency deployment; intelligent transportation systems etc. According to the viewpoint of network, problem of selfish nodes from the replica allocation has been addressed. This term is stated as selfish replica allocation. The fact that a selfish replica allocation could lead to overall poor data accessibility in a MANET, so the proposed solution describes a selfish node detection method and replica allocation techniques to handle the selfish replica allocation appropriately. The proposed strategies are inspired by the real-world observations in economics in terms of credit risk and in human friendship management in terms of choosing one’s friends completely one’s own discretion. We applied the notion of credit risk from economics to detect selfish nodes. Every node in a MANET calculates credit risk information on other connected nodes individually to measure the degree of selfishness. 5. FUTURE SCOPE A selfish node is one that tries to utilize the network using its limited resource only for its own benefit, since each node in a MANET has resource constraints, such as battery and storage limitations, it would like to enjoy the benefits provided by the resources of other nodes, but it may not make its own resource available to help others. Such selfish behavior can potentially lead to a wide range of problems for a MANET. The research is currently going on the impact of different mobility patterns. The proposed system improves the data accessibility, reduces communication cost, and average query delay and also to reduce the detection time of the selfish nodes.
  • 4. Laxmi R. Shinde et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 165-168 © 2016, IJCERT All Rights Reserved Page | 168 REFERENCES [1] Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Jae-Ho Choi, Kyu-Sun Shim, SangKeun Lee, and Kun-Lung Wu, Fellow, IEEE VOL. 11, NO. 2, FEBRUARY 2012 [2] L. Anderegg and S. Eidenbenz, “Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents,” Proc. ACM MobiCom, pp. 245-259, 2003. [3] K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks,” Proc. IEEE Wireless Comm. and Networking, pp. 2137- 2142, 2005. [4] B.-G. Chun, K. Chaudhuri, H. Wee, M. Barreno, C.H. Papadimitriou, and J. Kubiatowicz, “Selfish Caching in Distributed Systems A Game-Theoretic Analysis,” Proc. ACM Symp. Principles of Distributed Computing, pp. 21-30, 2004. [5] E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, “Managing and Sharing Servents’ Reputations in P2P Systems,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 840-854,July/Aug. 2003. [6] Y. Liu and Y. Yang, “Reputation Propagation and Agreement in Mobile Ad-Hoc Networks,” Proc. IEEE Wireless Comm. And Networking Conf., pp. 1510-1515, 2003. [7] S.-Y. Wu and Y.-T. Chang, “A User-Centered Approach to Active Replica Management in Mobile Environments,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1606-1619, Nov. 2006. [8] D. Hales, “From Selfish Nodes to Cooperative Networks -Emergent Link-Based Incentives in Peer-to- Peer Network Proc.IEEE Int’l Conf. Peer-to-Peer Computing, pp. 151-158, 2004. [9] T. Hara, “Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility,” Proc. IEEE INFOCOM, pp.1568- 1576, 2001. [10] T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1515- 1532, Nov. 2006. *11+ T. Hara and S.K. Madria, “Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 7, pp. 950-967, July 2009. [12] M. Li, W.-C. Lee, and A. Sivasubramaniam, “Efficient Peer-to Peer Information Sharing over Mobile Ad Hoc Networks,” Proc. World Wide Web (WWW) Workshop Emerging Applications for Wireless and Mobile Access, pp. 2-6, 2004. [13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks,” Proc. ACM MobiCom, pp. 255-265, 2000. [14] Y. Yoo and D.P. Agrawal, “Why Does It Pay to be Selfish in a MANET,” IEEE Wireless Comm., vol. 13, no. 6, pp. 87-97, Dec. 2006.