A. Thillipan, S. Dinesh Kumar
In this paper we propose redundancy management by utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes with hacker nodes for analysis. It encloses the redundancy management is to exploit the tradeoff between energy consumption and the gain in reliability, timeliness, and security. We formulate the tradeoff as an optimization problem for dynamically determining the best redundancy level to apply to multipath routing for intrusion tolerance so that the query response success probability is maximized while prolonging the useful lifetime. Although the ongoing trend is to adopt by the mobile ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. Unlike the conventional network, another feature of the open network as well as closed network environment where nodes can join and leave the network freely. To analyze the best redundancy level in terms of path redundancy and source redundancy.