TY - GEN
T1 - A novel approach for creating consistent trust and cooperation (CTC) among mobile nodes of ad hoc network
AU - Rajput, Khurram S.
AU - Elleithy, Khaled M.
AU - Rizvi, Syed S.
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2008
Y1 - 2008
N2 - This paper provides a critical analysis of the recent research wok and its impact on the overall performance of a mobile Ad hoc network. In this paper, we clarify some of the misconceptions in the understating of selfishness and miss-behavior of nodes. Moreover, we propose a mathematical model that based on the time division technique to minimize the node misbehavior by avoiding unnecessary elimination of bad nodes. Our proposed approach not only improves the resource sharing but also creates a consistent trust and cooperation (CTC) environment among the mobile nodes. We believe, that the proposed mathematical model not only points out the weaknesses of the recent research work but also approximates the optimal values of the critical parameters such as throughput, transmission over head, channel capacity etc. The simulation results demonstrate the success of the proposed approach that significantly minimizes the malicious nodes and consequently maximizes the overall throughput of the Ad Hoc network than the other well known schemes.
AB - This paper provides a critical analysis of the recent research wok and its impact on the overall performance of a mobile Ad hoc network. In this paper, we clarify some of the misconceptions in the understating of selfishness and miss-behavior of nodes. Moreover, we propose a mathematical model that based on the time division technique to minimize the node misbehavior by avoiding unnecessary elimination of bad nodes. Our proposed approach not only improves the resource sharing but also creates a consistent trust and cooperation (CTC) environment among the mobile nodes. We believe, that the proposed mathematical model not only points out the weaknesses of the recent research work but also approximates the optimal values of the critical parameters such as throughput, transmission over head, channel capacity etc. The simulation results demonstrate the success of the proposed approach that significantly minimizes the malicious nodes and consequently maximizes the overall throughput of the Ad Hoc network than the other well known schemes.
UR - http://www.scopus.com/inward/record.url?scp=84878550206&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84878550206&partnerID=8YFLogxK
U2 - 10.1007/978-1-4020-8737-0_91
DO - 10.1007/978-1-4020-8737-0_91
M3 - Conference contribution
AN - SCOPUS:84878550206
SN - 9781402087363
T3 - Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics
SP - 506
EP - 511
BT - Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics
T2 - 2007 Int. Conf. on Telecommunications and Networking, TeNe 2007, 2007 Int. Conf. on Industrial Electronics, Technology and Automation, IETA 2007, Part of the Int. Jt. Conf. on Computer, Information, and Systems Sciences, and Engineering, CISSE 2007
Y2 - 3 December 2007 through 12 December 2007
ER -