On-demand multicast routing protocol in multihop wireless mobile networks
Mobile Networks and Applications
Performance Analysis of Location-Dependent Cache Invalidation Schemes for Mobile Environments
IEEE Transactions on Knowledge and Data Engineering
Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
Continuous Location Dependent Queries in Mobile Wireless Sensor Networks
Wireless Personal Communications: An International Journal
A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
An Energy-Efficient Threshold-Based Clustering Protocol for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Connectivity Analysis for Wireless Sensor Networks with Antenna Array Integrated Central Node
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Performance of data access is quite degraded in wireless mobile network due to limited resources and low bandwidth. Cache technique is one of widely used technique to improve performance of data search. But, it has vulnerability easily exposed to many attacks. In this paper, we propose a technique which prevents modification of cache data from malicious node and provides efficient cache. In the proposed technique, member key is used in order to prevent malicious nodes from joining in network. Cluster head is elected based on reliability value and the number of connection after MANET is divided into clusters. It evaluates reliability of MN based on received reliability value from neighbor nodes and issues member key. MNs request cache using member key and transmit data. Cluster head manages two tables to provide efficient cache. Transmission delay and overhead is reduced by doing so. We confirmed superior performance of the proposed technique through the experiment results.