Object Deployment Using Data Trans-Reception in Military Applications

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-9 Number-4                          
Year of Publication : 2014
Authors : Subha J , Karthikeyan R
DOI :  10.14445/22312803/IJCTT-V9P138


Subha J , Karthikeyan R."Object Deployment Using Data Trans-Reception in Military Applications". International Journal of Computer Trends and Technology (IJCTT) V9(4):193-197, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
An mobile ad-hoc network (MANETs) is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme.

[1] H. Miranda and L. Rodrigues, “ Preventing Selfishness in Open Mobile Ad Hoc Networks ,” Proc. Seventh Caber Net Radicals Workshop, Oct. 2002.
[2] L.M. Feeney and M. Nilsson, “ Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment,” Proc. IEEE INFOCOM, 2001.
[3] S. Marti, T. Giuli, K. Lai, and M. Baker, “ Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom, Aug.2000 .
[4] Y. Hu, A. Perrig, and D.B. Johnson, “ Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Proc. MobiCom, Sept. 2002.
[5] L. Zhou and Z.J. Haas, “ Securing Ad Hoc Networks,” IEEE Network Magazine, vol.13, no. 6, Nov./Dec. 1999.

Battery-based energy, MANETs, Two-hop Routing Misbehavior, 2ACK