Abstract
In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.
Similar content being viewed by others
References
Corson S, Macker J (1998) Mobile ad hoc Networking(MANET). In: Proc. of ACM SIGMOBILE mobile computing and Communications Review Volume 2 Issue 1, 9–14
Perkins CE (2008) Mobile ad hoc networking. In: Addison-Wessley Professional
Corson S, Macker J, Batsell S (1996) Architectural considerrations for mobile mesh networking. In: Proc. of military communication conference. IEEE Press, pp.225–229
Curiac DI, Banias O, Dragan F, Volosencu C, Dranga O (2007) Malicious node detection in wireless senser networks using an autoregression technique. In: 3rd international conference on networking and services, Athens, p.83
Atakli IM, Hu H, Chen Y, Ku WS, Su Z (2008) Malicious node detection in wireless senser netowkr using weighted trust evaluation. In: Proc. of spring simulations multiconference, Ottawa, pp.836–843
Ju L, Li H, Liu Y, Xue W, Li K, Chi Z (2010) An improved intrustion detection scheme based on weighted trust evaluation for wireless sensor networks. In: Proc. of the 5th international conference on ubiquitous information technology and applications(CUTE), Sanya, pp.1–6
Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. In: IEEE wireless communications Volume 11, Issue 1, IEEE Press, pp.38–47
Han IS, Ryou H-B, Kang S-J (2006) Multi-path security-aware routing protocol mechanism for ad hoc network. In: Conference of ICHIT, 2006 international conference on hybrid information technology-Vol 1(ICHIT’06), pp.620–626
Marti S et al. (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th annual international conference on Mobile computing and networking. ACM, p. 255–265
Fall K (2001) Varadhan K. The ns Nanual, UC Berkeley, LBL, USC/ISL, Available at http://www.isi.edu/nsnam/ns
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cha, HJ., Yang, HK. & Kim, YH. A node management scheme for stable P2P service in mobile ad-hoc networks. Peer-to-Peer Netw. Appl. 9, 558–565 (2016). https://doi.org/10.1007/s12083-015-0392-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-015-0392-5