Handling selfishness in replica allocation over a mobile ad hoc network

Jae Ho Choi, Kyu Sun Shim, Sang-Geun Lee, Kun Lung Wu

Research output: Contribution to journalArticlepeer-review

49 Citations (Scopus)

Abstract

In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality, however, some nodes may selfishly decide only to cooperate partially, or not at all, with other nodes. These selfish nodes could then reduce the overall data accessibility in the network. In this paper, we examine the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. We term this selfish replica allocation. In particular, we develop a selfish node detection algorithm that considers partial selfishness and novel replica allocation techniques to properly cope with selfish replica allocation. The conducted simulations demonstrate the proposed approach outperforms traditional cooperative replica allocation techniques in terms of data accessibility, communication cost, and average query delay.

Original languageEnglish
Article number5740900
Pages (from-to)278-291
Number of pages14
JournalIEEE Transactions on Mobile Computing
Volume11
Issue number2
DOIs
Publication statusPublished - 2012 Feb

Bibliographical note

Funding Information:
This work was supported in part by the Mid-Career Researcher Program through an NRF grant funded by the MEST (No. 2009-0077925) and with partial support from a Korea University Grant.

Keywords

  • Mobile ad hoc networks
  • degree of selfishness
  • selfish replica allocation

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Handling selfishness in replica allocation over a mobile ad hoc network'. Together they form a unique fingerprint.

Cite this