Skip to main content
Erschienen in: Wireless Personal Communications 3/2016

01.02.2016

A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET

verfasst von: Rajkumar Mylsamy, Subramanian Sankaranarayanan

Erschienen in: Wireless Personal Communications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for trust and head selection (2PTH) algorithm is proposed for communication privacy from intermediate malicious nodes. A 2PTH algorithm is a combination of preference-based trust selection algorithm (PTA) and preference-based head election algorithm (PHA). To discover routes with trusted nodes, PTA is proposed for determining a route without malevolent nodes for forwarding packets based on Weight assignment to trust parameters. The work also proposes a PHA, based on internal and external factors of a node, aiming at finding quick response during the routing process. Simulations are performed using NS2 simulator. We compare the proposed 2PTH algorithm with other clustering algorithms, which are cluster-based trust-aware routing protocol, 2ACK model and low energy adaptive clustering hierarchy. Our analysis and simulation results show that, the proposed 2PTH algorithm efficiently detects and isolates malicious nodes, and it outperforms the other algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2004). Mobile ad hoc networking. London: IEEE Press and Wiley.CrossRef Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2004). Mobile ad hoc networking. London: IEEE Press and Wiley.CrossRef
2.
Zurück zum Zitat Dana, A., Yadegari, A. M., Hajhosseini, M., & Mirfakhraie, T. (2008). A robust cross-layer design of clustering-based routing protocol for MANET. In Proceedings of international conference on advanced communication technology (ICACT) (pp. 1055–1059). Dana, A., Yadegari, A. M., Hajhosseini, M., & Mirfakhraie, T. (2008). A robust cross-layer design of clustering-based routing protocol for MANET. In Proceedings of international conference on advanced communication technology (ICACT) (pp. 1055–1059).
3.
Zurück zum Zitat Hwang, R. H., Wang, C. Y., Wu, C. J., & Chen, G. N. (2013). A novel efficient power-saving MAC protocol for multi-hop MANETs. International Journal of Communication Systems, 26(1), 34–55.CrossRef Hwang, R. H., Wang, C. Y., Wu, C. J., & Chen, G. N. (2013). A novel efficient power-saving MAC protocol for multi-hop MANETs. International Journal of Communication Systems, 26(1), 34–55.CrossRef
4.
Zurück zum Zitat Perkins, C. E. (2001). Ad hoc networking. Reading, MA: Addison-Wesley. Perkins, C. E. (2001). Ad hoc networking. Reading, MA: Addison-Wesley.
5.
Zurück zum Zitat Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.CrossRef Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.CrossRef
6.
Zurück zum Zitat Chen, Y. S., Tseng, Y. C., Sheu, J. P., & Kuo, P. H. (2004). An on-demand, linkstate, multi-path QoS routing in a wireless mobile ad-hoc network. Computer Communication, 27(1), 27–40.CrossRef Chen, Y. S., Tseng, Y. C., Sheu, J. P., & Kuo, P. H. (2004). An on-demand, linkstate, multi-path QoS routing in a wireless mobile ad-hoc network. Computer Communication, 27(1), 27–40.CrossRef
7.
Zurück zum Zitat Perkins, C., Royer, E. & Das, S. (1999). Ad hoc on-demand distance vector (AODV). In Proceedings of second IEEE workshop on mobile computing systems and applications (pp. 90–100). Perkins, C., Royer, E. & Das, S. (1999). Ad hoc on-demand distance vector (AODV). In Proceedings of second IEEE workshop on mobile computing systems and applications (pp. 90–100).
8.
Zurück zum Zitat Liang, B., & Haas, Z. J. (2006). Hybrid routing in ad hoc networks with a dynamic virtual backbone. IEEE Transactions on Wireless Communications, 5(6), 1392–1405.CrossRef Liang, B., & Haas, Z. J. (2006). Hybrid routing in ad hoc networks with a dynamic virtual backbone. IEEE Transactions on Wireless Communications, 5(6), 1392–1405.CrossRef
9.
Zurück zum Zitat Samar, P., Pearlman, M. R., & Haas, Z. J. (2004). Independent zone routing: An adaptive hybrid routing framework for ad hoc wireless networks. ACM Transactions on Networking, 12(4), 595–608.CrossRef Samar, P., Pearlman, M. R., & Haas, Z. J. (2004). Independent zone routing: An adaptive hybrid routing framework for ad hoc wireless networks. ACM Transactions on Networking, 12(4), 595–608.CrossRef
10.
Zurück zum Zitat Tseng, C. C., & Chen, K. C. (2007). Organizing an optimal cluster-based ad hoc network architecture by the modified Quine–McCluskey algorithm. IEEE Communication, 11(1), 43–45.CrossRef Tseng, C. C., & Chen, K. C. (2007). Organizing an optimal cluster-based ad hoc network architecture by the modified Quine–McCluskey algorithm. IEEE Communication, 11(1), 43–45.CrossRef
11.
Zurück zum Zitat Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing Journal, 5(2), 193–204.CrossRef Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing Journal, 5(2), 193–204.CrossRef
12.
Zurück zum Zitat Peiravi, A., Mashhadi, H. R., & Hamed, J. (2012). An optimal energy-efficient clustering method in wireless sensor networks using multi-objective genetic algorithm. International Journal of Communication Systems, 26(1), 114–126.CrossRef Peiravi, A., Mashhadi, H. R., & Hamed, J. (2012). An optimal energy-efficient clustering method in wireless sensor networks using multi-objective genetic algorithm. International Journal of Communication Systems, 26(1), 114–126.CrossRef
13.
Zurück zum Zitat Agarwal, R., & Motwani, M. (2009). Survey of clustering algorithms for MANET. International Journal on Computer Science and Engineering, 1, 98–104. Agarwal, R., & Motwani, M. (2009). Survey of clustering algorithms for MANET. International Journal on Computer Science and Engineering, 1, 98–104.
14.
Zurück zum Zitat Bechler, M., Hof, H. J., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of twenty-third annual joint conference of the IEEE computer and communications societies (pp. 2393–2403). Bechler, M., Hof, H. J., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of twenty-third annual joint conference of the IEEE computer and communications societies (pp. 2393–2403).
15.
Zurück zum Zitat Park, C., Lee, Y. H., Yoon, H., Choi, D. S., & Jin, S. H. (2005). Cluster based trust evaluation in ad hoc networks. In Proceedings of international conference on advanced communication technology (pp. 503–507). Park, C., Lee, Y. H., Yoon, H., Choi, D. S., & Jin, S. H. (2005). Cluster based trust evaluation in ad hoc networks. In Proceedings of international conference on advanced communication technology (pp. 503–507).
16.
Zurück zum Zitat Yang, W. D., & Zhang, G. Z. (2007). A weight-based clustering algorithm for mobile ad hoc network. In Proceedings of international conference on wireless and mobile communications (ICWMC‘07). Yang, W. D., & Zhang, G. Z. (2007). A weight-based clustering algorithm for mobile ad hoc network. In Proceedings of international conference on wireless and mobile communications (ICWMC‘07).
17.
Zurück zum Zitat Mangai, S., & Tamilarasi, A. (2011). A new approach to geographic routing for location aided cluster based MANETs. Eurasip Journal of Wireless Communications, 18, 1–10.CrossRef Mangai, S., & Tamilarasi, A. (2011). A new approach to geographic routing for location aided cluster based MANETs. Eurasip Journal of Wireless Communications, 18, 1–10.CrossRef
18.
Zurück zum Zitat Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969–984.CrossRef Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969–984.CrossRef
19.
Zurück zum Zitat Su, Y., Hwang, S., & Dow, C. (2008). An efficient cluster-based routing algorithm in ad hoc networks with unidirectional links. Journal of Information Science Engineering, 24(5), 1409–1428. Su, Y., Hwang, S., & Dow, C. (2008). An efficient cluster-based routing algorithm in ad hoc networks with unidirectional links. Journal of Information Science Engineering, 24(5), 1409–1428.
20.
Zurück zum Zitat Handy, M. J., Haas, M., & Timmermann, D. (2002). Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In Proceedings of international workshop on mobile and wireless communications network (pp. 368–372). Handy, M. J., Haas, M., & Timmermann, D. (2002). Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In Proceedings of international workshop on mobile and wireless communications network (pp. 368–372).
21.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.CrossRef Hu, Y. C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.CrossRef
22.
Zurück zum Zitat Li, X., Lyu, M. R., & Liu, J. (2004). A trust model based routing protocol for secure ad hoc networks. In Proceedings of IEEE aerospace conference (pp. 1286–1295). Li, X., Lyu, M. R., & Liu, J. (2004). A trust model based routing protocol for secure ad hoc networks. In Proceedings of IEEE aerospace conference (pp. 1286–1295).
23.
Zurück zum Zitat Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.CrossRef Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.CrossRef
24.
Zurück zum Zitat Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication System, 25(9), 1189–1212.CrossRef Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication System, 25(9), 1189–1212.CrossRef
25.
Zurück zum Zitat Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in open environments. Perform Evaluation, 65(2), 99–128.CrossRef Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in open environments. Perform Evaluation, 65(2), 99–128.CrossRef
26.
Zurück zum Zitat Chatterjee, P. (2009). Trust based clustering and secure routing scheme for mobile ad hoc networks. International Journal of Computer Networks and Communication, 1(2), 84–97. Chatterjee, P. (2009). Trust based clustering and secure routing scheme for mobile ad hoc networks. International Journal of Computer Networks and Communication, 1(2), 84–97.
27.
Zurück zum Zitat Wang, Q., Wang, J., Yu, J., & Zhang, Y. (2012). Trust-aware query routing in P2P social networks. International Journal of Communication System, 25(10), 1260–1280.MathSciNetCrossRef Wang, Q., Wang, J., Yu, J., & Zhang, Y. (2012). Trust-aware query routing in P2P social networks. International Journal of Communication System, 25(10), 1260–1280.MathSciNetCrossRef
28.
Zurück zum Zitat Rani, V. G., & Punithavelli, M. (2010). Optimizing on demand weight-based clustering using trust model for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 1(4), 81–91.CrossRef Rani, V. G., & Punithavelli, M. (2010). Optimizing on demand weight-based clustering using trust model for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 1(4), 81–91.CrossRef
29.
Zurück zum Zitat Chen, J., & Wu, J. (2010). A survey on cryptography applied to secure mobile ad hoc networks and wireless sensor networks. In H. Jin & W. Jiang (Eds.), Handbook of research on developments and trends in wireless sensor networks: from principle to practice. IGI Global. Chen, J., & Wu, J. (2010). A survey on cryptography applied to secure mobile ad hoc networks and wireless sensor networks. In H. Jin & W. Jiang (Eds.), Handbook of research on developments and trends in wireless sensor networks: from principle to practice. IGI Global.
30.
Zurück zum Zitat Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Proceedings of international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 589–596). Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Proceedings of international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 589–596).
31.
Zurück zum Zitat Kadri, B., Mohamed, A., & Feham, M. (2007). Secured clustering algorithm for mobile ad hoc networks. IJCSNS, 7(3), 27–34. Kadri, B., Mohamed, A., & Feham, M. (2007). Secured clustering algorithm for mobile ad hoc networks. IJCSNS, 7(3), 27–34.
32.
Zurück zum Zitat SathishBabu, B. B., & Venkataram, P. (2011). A trust model for routing in MANETs: A cognitive agents based approach. In Proceedings of international conference on security and management (pp. 208–214). SathishBabu, B. B., & Venkataram, P. (2011). A trust model for routing in MANETs: A cognitive agents based approach. In Proceedings of international conference on security and management (pp. 208–214).
33.
Zurück zum Zitat Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef
Metadaten
Titel
A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET
verfasst von
Rajkumar Mylsamy
Subramanian Sankaranarayanan
Publikationsdatum
01.02.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3010-1

Weitere Artikel der Ausgabe 3/2016

Wireless Personal Communications 3/2016 Zur Ausgabe

Neuer Inhalt