4 research outputs found

    Identification of Malicious Node for Effective Top-k Query Processing in MANETS

    Get PDF
    In Mobile Ad-hoc networks, query processing is optimized using Top-k query processing. The accuracy of the results can be lowered if there exists malicious node. In our proposed system, we assume that malicious node perform Data Replacement Attack, in which the malicious node replaces necessary data sets with the false data sets. In our system malicious node identification method, the query issuing node receives the reply messages from the nodes; if a query-issuing node detects a DRA then it performs subsequent inquiries with the nodes which receive the information from the malicious node. In this way the query issuing node identifies the malicious node, and shares the information with the neighbouring nodes. Then the nodes share the information regarding the malicious node with the other nodes which are far away. Each node tends to identify the malicious node in the network, and then floods the information. Query issuing node performs grouping of the nodes based on the similarity of the information on malicious node detected by the nodes. Identification of malicious node is performed based on the results of malicious node identifications by these groups

    A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks

    Full text link

    Collaborative streaming of on demand videos for mobile devices

    Get PDF
    The 3G and LTE technologies made video on-demand a popular entertainment for users on the go. However, bandwidth insufficiency is an obstacle in providing high quality and smooth video playout in cellular networks. The objective of the proposed PhD research is to provide a user with high quality video streaming with minimal stalling time by aggregating bandwidth from ubiquitous nearby devices that may be using different radio networks
    corecore