Beruflich Dokumente
Kultur Dokumente
P. Parameswari
Research scholar, Anna University of Technology, Coimbatore-641 047, India
E-mail: param_pnr2000@yahoo.co.in
C. Chandrasekar
Reader, Periyar University, Salem – 636 011, India
E-mail: ccsekar@gmail.com
Abstract
The security and cache consistent scheme presented in this paper mitigates security
attacks in query nodes of server control cache mode in mobile networks. It eliminates fake
requests in query nodes. It works on a cache consistency scheme based on a previously
proposed architecture for caching database data in MANETs. The consistency scheme is
server-based in which control mechanisms are implemented to adapt the process of caching
a data item and updating it by the server to its popularity and its data update rate at the
server. The security mechanism implements methods to handle disconnections of query
directory (QD) and cache node (CN) nodes from the network and to control how the cache
of each node is updated or discarded when it returns to the network. It estimates the
average response time of node requests and the average node bandwidth utilization are
derived in order to determine the gains (or costs) of employing our scheme in the MANET.
Simulations are performed to measure and evaluate the security mechanism for query node
from passive and active attacks with average data request response time, cache update
delay, and bandwidth utilization.
1. Introduction
In a mobile ad hoc network (MANET), data caching is essential as it reduces contention in the
network, increases the probability of nodes getting desired data, and improves system performance.
The major issue that faces cache management is the maintenance of data consistency between the client
cache and the server. In a MANET, all messages sent between the server and the cache are subject to
network delays, thus, impeding consistency by download delays that are considerably noticeable and
more severe in wireless mobile devices. All cache consistency algorithms are developed with the same
goal in mind to increase the probability of serving data items from the cache that is identical to those
on the server.
A large number of such algorithms have been proposed in the literature, and they fall into three
groups: server invalidation, client polling, and time to live (TTL). With server invalidation, the server
sends a report upon each update to the client. Two examples are the Piggyback server invalidation and
the Invalidation report mechanisms. In client polling, like the Piggyback cache validation of, a
Secured Cache Consistent Scheme for Mobile Ad Hoc Network 239
validation request is initiated according to a schedule. If the copy is up to date, the server informs the
client that the data have not been modified; else the update is sent to the client.
Finally, with TTL algorithms, a server-assigned TTL value (e.g., T) is stored alongside each
data item d in the cache. The data d are considered valid until T time units pass since the cache update.
Usually, the first request for d submitted by a client after the TTL expiration will be treated as a miss
and will cause a trip to the server to fetch a fresh copy of d. Many algorithms were proposed to
determine TTL values, including the fixed TTL approach, adaptive TTL, and Squid’s LM-factor. TTL-
based consistency algorithms are popular due to their simplicity, sufficiently good performance, and
flexibility to assign TTL values for individual data items.
However, TTL-based algorithms, like client polling algorithms, are weakly consistent, in
contrast to server invalidation schemes that are generally strongly consistent. According to, with strong
consistency algorithms, users are served strictly fresh data items, while with weak algorithms, there is a
possibility that users may get inconsistent (stale) copies of the data. This work describes a server-based
scheme implemented on top of the COACS caching architecture we proposed in COACS, elected
query directory (QD) nodes cache submitted queries and use them as indexes to data stored in the
nodes that initially requested them (CN nodes).
Since COACS did not implement a consistency strategy, the system described in this paper fills
that void and adds several improvements:
a) Enabling the server to be aware of the cache distribution in the MANET,
b) Making the cached data items consistent with their version at the server.
c) Adapting the cache update process to the data update rate at the server relative to the
request rate by the clients. With these changes, the overall design provides a complete
caching system in which the server sends to the clients selective updates that adapt to
their needs and reduces the average query response time.
2. Literature Review
Several cache consistency (invalidation) schemes have been proposed in the literature [1], [2] for
MANETS. In general, these schemes fall into three types i.e., pull or client model (caching node (CN)
asks for updates from server), push or server model, (server sends updates to CN), and cooperative
model (CN and server cooperate to keep the data up-to-date). Pull-based strategies achieve smaller
query delay times at the cost of higher traffic load, whereas push-based strategies achieve lower traffic
load at the cost of larger query delays. Cooperative-based strategies tend to be halfway between both
ends.
Server-based approaches employ invalidation reports (IRs) that are periodically broadcasted by
the server. An IR normally carries the IDs of the updated data items and the time stamps of the
updates. Most research in this area has focused on reducing the time intervals between updates or
making the process of sending update reports less static. One of the improvements over the basic IR
approach was proposed by Li et al. [12]. The basic idea is for each node to cache the last K reports that
are broadcasted by the server, and for the server to store the IRs for future use. Several approaches
attempted to make the process of sending reports dynamic [3], [8], [11], [15]. Yuen et al. proposed a
scheme by absolute validity interval (AVI) that is calculated dynamically by the server based on the
update rate. A serious issue, however, arises with the above approaches when the frequency of updates
at the server is high, which could overload the clients with update reports.
A different approach was taken by Cai and Tan [4] in proposing three energy-efficient selective
cache invalidation schemes based on the group invalidation method in which a separate IR is
broadcasted for each group of items. These strategies allow clients to selectively tune to the portions of
the invalidation report that are of interest to them, while returning to sleep or idle modes during the rest
of the IR. This technique produces good results when the update rate is high, but makes the size of the
IR quite large.
240 P. Parameswari and C. Chandrasekar
In order to reduce the size of the IR, Jing et al. [13] proposed using bit sequences (BSs),
according to which the data server broadcasts a sequence of bits with a time stamp, where each bit
represents a data item, and its position in the sequence represents an index to its corresponding item.
The clients get the mapping of bits to the names of data items from the server. A value of 1 in the BS
means that the corresponding item has been updated since the last IR, and a value of 0 indicates
otherwise. The authors improved on the BS algorithm in [9] through a multidimensional bit sequence.
The granularity of each bit in the BS was varied according to the size of the database at the server.
The consistency of location-dependent data was studied in [5], [14], which proposes methods to
validate and update information that change their values depending on the location of the client, like
traffic reports and parking information. In this context, not only the temporal consistency but also the
location-dependent consistency (due to client mobility) is taken into consideration. The proposed work
in this paper presented a cache consistency scheme along with the security of cache nodes to be carried
out to eliminates attacks generated by social neighbor nodes.
there comes no cache query before the TTR expires. Before the TTR expires, there are multiple data
updates (only the last data update should make the data source node push the caching nodes); Thus, the
following design principles should be followed in designing GWSP: use the push mechanism to save
consistency maintenance cost, but Push only if the cache copy is expected to serve queries, Push if
there are probably no other data updates before TTR expires,
Upon the source data update at tu, consider the cache status on one aching node. The TTR of
this cache copy was renewed (via push or pull) at time t0. According to the design principles, the data
source node pushes one caching node only when the following two requirements are both satisfied. The
first one is the probability that there is at least one query in period (t0+ä, tu+ä) is greater than threshold
value ôq. The second one is the probability that there is at least one update in period (tu, t0+d) is less
than threshold value ôu.
directly damage other nodes. In Active attacks, malicious nodes damage other nodes by causing
network outage by partitioning while saving battery life is not a priority.
14
10
Cache
consistency
8
scheme
6 Secured
cache
4 consistency
scheme
2
0
1 2 3 4 5 6 7 8
Bandwidth (kb))
The ratio of attack resistant query request rate to bandwidth utilized to respond to the requests
attack resistance expressions indicate that the wireless bandwidth gain may be negative, but the
response time gain is always positive. The security resistance performance generates a reasonable
trade-off, especially when bandwidth is sacrificed in order to speed up the query response time. It
illustrates the average bandwidth and response time gains under two situations, when server cache
updates is applied as described and with a modified version that lets the server send updates to the
Secured Cache Consistent Scheme for Mobile Ad Hoc Network 243
receiving nodes at all times. The performance of secured cache consistency scheme based on the node
density is depicted in Figure 2 against cache update delay.
10
9
Cache update delay (ms)
8
7
6 Cache consistency
scheme
5
Secured cache
4 consistency scheme
3
2
1
0
1 2 3 4 5 6 7 8
Node density (nos)
Before analyzing the graphs, note that several factors play a role in determining the gain values,
most importantly the number of QDs, and the data packet size (Sd) relative to the request packet size
(Sr). The effect of the number of QDs is intuitive because with more QDs, more data will be cached in
the network, and therefore, both the bandwidth and response time gains will increase. Figure 3 shows
that the bandwidth utilization per node increases with the inconsistent cache mechanism, but in secured
consistent cache mechanism minimum bandwidth utilization is required which shows better
performance of our proposed work.
Figure 3: Bandwidth utilization on secured cache consistent mechanism against inconsistent cache
244 P. Parameswari and C. Chandrasekar
5. Conclusions
The proposed security mechanism safely maintains query node to maintain cache consistency and
attack resistance in Mobile Ad hoc Network. The approach was built on top of the cooperative cache
architecture for caching data items in MANETs and searching for them. Then analyzed the
performance of the system through a gain loss model and then evaluated it by comparing it with the
Updated Invalidation Report mechanism.
When the node density increases or the node request rate goes up, the query request delay in the
system is either reduced or remains practically unaffected, while the cache update delay experiences a
moderate rise. Even if a higher update delay means that the probability of nodes getting stale data
increases, the proposed system includes a provision for keeping track of such nodes and supplying
them with fresh data within a delta time limit. The security scheme deployed in this paper resists cache
nodes for active and passive attacks generated by adversary nodes during the maintenance of cache
consistency.
Hence, it can be concluded that the system can scale to a moderately large network even when
nodes are requesting data frequently. The increase in the node speed and disconnection rate also only
affected the cache update delay, and to a lesser extent, the traffic in the network. This reflects on the
robustness of the architecture and its ability to cope with dynamic environments.
References
[1] H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, “COACS: A Cooperative and
Adaptive Caching System for MANETS,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp.
961- 977, Aug. 2008.
[2] H. Artail and K. Mershad, “MDPF: Minimum Distance Packet Forwarding for Search
Applications in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 10, pp.
1412- 1426, Oct. 2009.
[3] O.Bahat and A. Makowski, “Measuring Consistency in TTLBased Caches,” Performance
Evaluation, vol. 62, pp 439-455, 2005.
[4] J. Cai and K. Tan, “Energy-Efficient Selectiv e Cache Invalidation,” Wireless Networks J., vol.
5, no. 6, pp. 489-502, Dec. 1999.
[5] J. Cao, Y. Zhang, L. Xie, and G. Cao, “Consistency of Cooperative Caching in Mobile Peer-to-
Peer Systems over MANETs,” Proc. Third Int’l Workshop Mobile Distributed Computing, vol.
6, pp. 573- 579, 2005.
[6] G. Cao, “A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments,”
IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 1251-1265, Sept. 2003.
[7] D. Zhou and T.H. Lai, “An Accurate and Scalable Clock synchronization Protocol for IEEE
802.11-Based Multihop Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol.
18, no. 12, pp. 1797-1808, Dec. 2007.
[8] Y. Chung and C. Hwang, “Transactional Cache Management with A periodic Invalidation
Scheme in Mobile Environments,” Advances in Computing Science, pp. 50-61, Springer, 1999.
[9] A. Elmagarmid, J. Jing, A. Helal, and C. Lee, “Scalable Cache Invalidation Algorithms for
Mobile Data Access,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 6, pp. 1498-1511,
Nov. 2003.
[10] H. Jin, J. Cao, and S. Feng, “A Selective Push Algorithm for Cooperative Cache Consistency
Maintenance over MANETs,” Proc. Third IFIP Int’l Conf. Embedded and Ubiquitous
Computing, Dec. 2007.
[11] X. Kai and Y. Lu, “Maintain Cache Consistency in Mobile Database Using Dynamical
Periodical Broadcasting Strategy,” Proc. Second Int’l Conf. Machine Learning and Cybernetics,
pp. 2389- 2393, 2003.
Secured Cache Consistent Scheme for Mobile Ad Hoc Network 245
[12] W. Li, E. Chan, Y. Wang, and D. Chen, “Cache Invalidation Strategies for Mobile Ad Hoc
Networks,” Proc. Int’l Conf. Parallel Processing, Sept. 2007.
[13] H. Maalouf and M. Gurcan, “Minimisation of the Update Response Time in a Distributed
Database System,” Performance Evaluation, vol. 50, no. 4, pp. 245-266, 2002.
[14] J. Xu, X. Tang, and D. Lee, “Performance Analysis of Location - Dependent Cache
Invalidation Schemes for Mobile Environments,” IEEE Trans. Knowledge and Data Eng., vol.
15, no. 2, pp. 474-488, Feb. 2003.
[15] J. Yuen, E. Chan, K. Lain, and H. Leung, “Cache Invalidation Scheme for Mobile Computing
Systems with Real-Time Data,” SIGMOD Record, vol. 29, no. 4, pp. 34-39, Dec. 2000.