Skip to main content
Top
Published in: Wireless Personal Communications 4/2023

14-11-2022

Trust Management Framework and High Energy Efficient Lifetime Management System for MANET using Self-Configurable Cluster Mechanism

Authors: C. Gopala Krishnan, S. Gomathi, G. Aravind Swaminathan, Y. Harold Robinson, A. M. AnushaBamini

Published in: Wireless Personal Communications | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The maximum hard side of MANET is that they’re power resource-limited wherein energy cannot be replenished. Our evaluation intention is to give a high power saving management system for MANET. Cluster approaches in MANET make other nodes into small disjoint groups, wherever every cluster node encompasses an organizer known as CH (Cluster Head). The primary difficult task within the methods is retaining created clusters. To decide any node as Cluster Head, it’s very essential to summarize its constraints and eligibility which is supported by the information of the node’s properties like its remaining power or energy. There may be a possibility of the Cluster Heads might be unsuccessful and act wrongly due to power instability. During failure, the Cluster Heads are unable to collect the date and transfer information well. This influences the effectiveness of the MANET. We can decrease the information failure by detecting the failure of CH earlier, and also it needs the lowest improvement efforts. A self-configurable cluster mechanism is proposed. We planned to identify the unstable Cluster Heads and soon it will be replaced by some other nodes. k-means protocol method has been developed to select Cluster Heads effectively. This protocol (k-means) operates on an interval or periodic irregular rotations of the Cluster Heads and some of the clusters vary between 0 and 1. If the arbitrary number is smaller than the pre-decided preset (threshold) value, the node becomes a Cluster Heads for the existing round. We’ve achieved and realized a decrease in power and energy loss in comparison to other protocols like transmission and direct communication protocols. The experimental result suggests that the proposed scheme works properly in a reduction in energy dissipation compared to other protocols like transmission and direct communication protocols.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ahmed, A., Abu Bakar, K., Channa, M. I., & Ahmed, A. (2014). A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science, 9, 280–296.MathSciNetCrossRef Ahmed, A., Abu Bakar, K., Channa, M. I., & Ahmed, A. (2014). A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science, 9, 280–296.MathSciNetCrossRef
3.
go back to reference Elwin, M. L., Freeman, R. A., & Lynch, K. M. (2017). Distributed Voronoi neighbor identification from inter-robot distances. IEEE Robotics and Automation Letters, 2(3), 1320–1327.CrossRef Elwin, M. L., Freeman, R. A., & Lynch, K. M. (2017). Distributed Voronoi neighbor identification from inter-robot distances. IEEE Robotics and Automation Letters, 2(3), 1320–1327.CrossRef
5.
go back to reference Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef
8.
go back to reference Janani, V. S., & Manikandan, M. S. K. (2018). Efficient trust management with Bayesian- Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. Journal of Wireless Communications and Networking, 25, 1–272. Janani, V. S., & Manikandan, M. S. K. (2018). Efficient trust management with Bayesian- Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. Journal of Wireless Communications and Networking, 25, 1–272.
12.
go back to reference Krishnan, C. G., Sivakumar, K., & Manohar, E. (2018). An enhanced method to secure and energy effective data transfer in WSN using hierarchical and dynamic elliptic curve cryptosystem. In 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1-7). IEEE. DOI: https://doi.org/10.1109/ICSSIT.2018.8748785. Krishnan, C. G., Sivakumar, K., & Manohar, E. (2018). An enhanced method to secure and energy effective data transfer in WSN using hierarchical and dynamic elliptic curve cryptosystem. In 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1-7). IEEE. DOI: https://​doi.​org/​10.​1109/​ICSSIT.​2018.​8748785.
13.
go back to reference Nagaraju, A., Kumar, G. C., & Ramachandram, S. (2011). Ad-hoc on demand distance vector routing algorithm using neighbor matrix method in static Ad-hoc networks. In N. Meghanathan, B. K. Kaushik, & D. Nagamalai (Eds.), Advances in networks and communications. CCSIT 2011. Communications in computer and information science. (Vol. 132). Springer. Nagaraju, A., Kumar, G. C., & Ramachandram, S. (2011). Ad-hoc on demand distance vector routing algorithm using neighbor matrix method in static Ad-hoc networks. In N. Meghanathan, B. K. Kaushik, & D. Nagamalai (Eds.), Advances in networks and communications. CCSIT 2011. Communications in computer and information science. (Vol. 132). Springer.
17.
go back to reference Shabut, A. M., Dahal, K. P., Bista, S. K., & Awan, I. U. (2015). Recommendation based trust model with an effective defence scheme for MANETs. IEEE Transactions on Mobile Computing, 14(10), 2101–2115.CrossRef Shabut, A. M., Dahal, K. P., Bista, S. K., & Awan, I. U. (2015). Recommendation based trust model with an effective defence scheme for MANETs. IEEE Transactions on Mobile Computing, 14(10), 2101–2115.CrossRef
18.
go back to reference Sirisala, S., & Ramakrishna, S. (2019). Survey: Enhanced trust management for improving QoS in MANETs. In R. Bapi, K. Rao, & M. Prasad (Eds.), First international conference on artificial intelligence and cognitive computing. Advances in intelligent systems and computing. (Vol. 815). Springer. Sirisala, S., & Ramakrishna, S. (2019). Survey: Enhanced trust management for improving QoS in MANETs. In R. Bapi, K. Rao, & M. Prasad (Eds.), First international conference on artificial intelligence and cognitive computing. Advances in intelligent systems and computing. (Vol. 815). Springer.
19.
go back to reference Tong, F., Pan, J., & Zhang, R. (2017). Distance distributions in finite ad hoc networks: Approaches, applications, and directions. In Ad Hoc Networks (pp. 167–179). Springer, Cham. Tong, F., Pan, J., & Zhang, R. (2017). Distance distributions in finite ad hoc networks: Approaches, applications, and directions. In Ad Hoc Networks (pp. 167–179). Springer, Cham.
20.
go back to reference Velu S.G., Gopala Krishnan C., Sivakumar K., Jevin J.A. (2020) Proof of Shared Ownerships and Construct A Collaborative Cloud Application. In: Balaji S., Rocha Á., Chung YN. (eds) Intelligent Communication Technologies and Virtual Mobile Networks. ICICV 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 33. Springer, Cham. Velu S.G., Gopala Krishnan C., Sivakumar K., Jevin J.A. (2020) Proof of Shared Ownerships and Construct A Collaborative Cloud Application. In: Balaji S., Rocha Á., Chung YN. (eds) Intelligent Communication Technologies and Virtual Mobile Networks. ICICV 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 33. Springer, Cham.
21.
go back to reference Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647–4658.CrossRef Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647–4658.CrossRef
22.
go back to reference Zhang, D., Gao, J., & Liu, X. (2019). Novel approach of distributed & adaptive trust metrics for MANET. Wireless Networks, 25, 3587–3603.CrossRef Zhang, D., Gao, J., & Liu, X. (2019). Novel approach of distributed & adaptive trust metrics for MANET. Wireless Networks, 25, 3587–3603.CrossRef
Metadata
Title
Trust Management Framework and High Energy Efficient Lifetime Management System for MANET using Self-Configurable Cluster Mechanism
Authors
C. Gopala Krishnan
S. Gomathi
G. Aravind Swaminathan
Y. Harold Robinson
A. M. AnushaBamini
Publication date
14-11-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10048-x

Other articles of this Issue 4/2023

Wireless Personal Communications 4/2023 Go to the issue