A Review on Top-k Query Processing and Prevention of Malicious Nodes Performing DRA and FNA In MANETs

被引:0
|
作者
Mathew, Melseena [1 ]
Yomas, Jerrin [1 ]
机构
[1] Vimal Jyothi Engn Coll, Dept Elect & Commun, Kannur, India
来源
2018 INTERNATIONAL CONFERENCE ON CONTROL, POWER, COMMUNICATION AND COMPUTING TECHNOLOGIES (ICCPCCT) | 2018年
关键词
Mobile ad hoc networks; Top-k query processing; Malicious nodes; Liar nodes; Data replacement attack; False notification attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Top-k query processing is an important technique used in mobile ad hoc networks which is used to overcome the challenge of retrieving the data in an environment of less bandwidth and battery life of devices. A query processing is done in several steps to satisfy the required query. The step which retrieves the data with maximum efficiency will be taken for query processing. Top-k query processing will retrieve the data with k highest scores so that only the necessary data sections are retrieved which will save the resources in MANETs. If a normal node changes to a malicious node which will degrade the performance of top-k query processing by allowing attacks. There are many kind of attacks are possible due to malicious nodes. DRA(Data Replacement Attack) and FNA(False Notification Attack) are the major attacks in top-k query processing. This paper deals with several methods of top-k query processing and the effects of DRA and FNA in top-k result.
引用
收藏
页码:288 / 291
页数:4
相关论文
共 14 条
  • [1] Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
    Tsuda, Takuji
    Komai, Yuka
    Hara, Takahiro
    Nishio, Shojiro
    IEEE ACCESS, 2016, 4 : 993 - 1007
  • [2] A SURVEY ON TOP-K QUERY PROCESSING IN MANETs
    Mohanapriya, T.
    Ranganathan, S. Raja
    Karthik, S.
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 480 - 484
  • [3] Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs
    Tsuda, Takuji
    Komai, Yuka
    Hara, Takahiro
    Nishio, Shojiro
    2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, : 130 - 139
  • [4] Top-k Query Processing with Conditional Skips
    Bortnikov, Edward
    Carmel, David
    Golan-Gueta, Guy
    WWW'17 COMPANION: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2017, : 653 - 661
  • [5] Efficient cluster-based top-k query routing with data replication in MANETs
    Daichi Amagata
    Takahiro Hara
    Yuya Sasaki
    Shojiro Nishio
    Soft Computing, 2017, 21 : 4161 - 4178
  • [6] Efficient cluster-based top-k query routing with data replication in MANETs
    Amagata, Daichi
    Hara, Takahiro
    Sasaki, Yuya
    Nishio, Shojiro
    SOFT COMPUTING, 2017, 21 (15) : 4161 - 4178
  • [7] An efficient top-k query processing framework in mobile sensor networks
    Yang, Heejung
    Chung, Chin-Wan
    Kim, Myoung Ho
    DATA & KNOWLEDGE ENGINEERING, 2016, 102 : 78 - 95
  • [8] Top-k Query Processing for Combinatorial Objects Using Euclidean Distance
    Suzuki, Takanobu
    Takasu, Atsuhiro
    Adachi, Jun
    PROCEEDINGS OF THE 15TH INTERNATIONAL DATABASE ENGINEERING & APPLICATIONS SYMPOSIUM (IDEAS '11), 2011, : 209 - 213
  • [9] TopX:: efficient and versatile top-k query processing for semistructured data
    Theobald, Martin
    Bast, Holger
    Majumdar, Debapriyo
    Schenkel, Ralf
    Weikum, Gerhard
    VLDB JOURNAL, 2008, 17 (01) : 81 - 115
  • [10] Top-k Query Processing with Replication Strategy in Mobile Ad Hoc Networks
    Sasaki, Yuya
    Hara, Takahiro
    Ishikawa, Yoshiharu
    2018 19TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2018), 2018, : 217 - 226