Skip to main content
Log in

A node management scheme for stable P2P service in mobile ad-hoc networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Corson S, Macker J (1998) Mobile ad hoc Networking(MANET). In: Proc. of ACM SIGMOBILE mobile computing and Communications Review Volume 2 Issue 1, 9–14

  2. Perkins CE (2008) Mobile ad hoc networking. In: Addison-Wessley Professional

  3. Corson S, Macker J, Batsell S (1996) Architectural considerrations for mobile mesh networking. In: Proc. of military communication conference. IEEE Press, pp.225–229

  4. Curiac DI, Banias O, Dragan F, Volosencu C, Dranga O (2007) Malicious node detection in wireless senser networks using an autoregression technique. In: 3rd international conference on networking and services, Athens, p.83

  5. Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless senser netowkr using weighted trust evaluation. In: Proc. of spring simulations multiconference, Ottawa, pp.836–843

  6. Ju L, Li H, Liu Y, Xue W, Li K, Chi Z (2010) An improved intrustion detection scheme based on weighted trust evaluation for wireless sensor networks. In: Proc. of the 5th international conference on ubiquitous information technology and applications(CUTE), Sanya, pp.1–6

  7. Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. In: IEEE wireless communications Volume 11, Issue 1, IEEE Press, pp.38–47

  8. Han IS, Ryou H-B, Kang S-J (2006) Multi-path security-aware routing protocol mechanism for ad hoc network. In: Conference of ICHIT, 2006 international conference on hybrid information technology-Vol 1(ICHIT’06), pp.620–626

  9. Marti S et al. (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th annual international conference on Mobile computing and networking. ACM, p. 255–265

  10. Fall K (2001) Varadhan K. The ns Nanual, UC Berkeley, LBL, USC/ISL, Available at http://www.isi.edu/nsnam/ns

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong-Ho Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cha, HJ., Yang, HK. & Kim, YH. A node management scheme for stable P2P service in mobile ad-hoc networks. Peer-to-Peer Netw. Appl. 9, 558–565 (2016). https://doi.org/10.1007/s12083-015-0392-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0392-5

Keywords

Navigation