Skip to main content
Top
Published in: Wireless Personal Communications 4/2017

03-06-2016

Weighted Clustering Trust Model for Mobile Ad Hoc Networks

Authors: M. Ashwin, S. Kamalraj, Mubarakali Azath

Published in: Wireless Personal Communications | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Adhoc Network (MANET) is a dynamic field that has acquired remarkable attention for its self-configuration and self-maintenance. It is composed of Mobile Nodes using radio links to form a network without any infrastructure. In MANETs, wireless nodes are allowed to move freely and can join/leave network. MANETs are extremely at risk to various misbehaviours due to reasons like absence of transmission infrastructures, dynamic network topologies, as well as short communicative range. For detecting as well as reducing misbehaviour, several trust management strategies were suggested for MANETs. MANETs trust migration is a level of belief according to nodes behaviour. This work investigated MANETs trust based clustering algorithm. A weighted clustering Trust model algorithm is proposed and impact of maliciousness and a cluster head selection algorithm is investigated. The simulations are conducted for without malicious nodes, 10 % malicious node and 20 % malicious node in the network with trust and without trust and for the proposed method. The packet delivery ratio improved by 16.18 % than 10 % malicious nodes with trust in the network compared with Trust model weighted clustering without malicious nodes for 40 nodes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Sharma, M., & Dubey, S. K. (2014). Analytical study of cluster based routing protocols in MANET. Sharma, M., & Dubey, S. K. (2014). Analytical study of cluster based routing protocols in MANET.
3.
go back to reference Aarti, D. S. (2013). Tyagi, “Study Of Manet: Characteristics, challenges, application and security attacks”. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 252–257. Aarti, D. S. (2013). Tyagi, “Study Of Manet: Characteristics, challenges, application and security attacks”. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 252–257.
4.
go back to reference Roy, D. B., & Chaki, R., (2013). MCBHIDS: Modified layered cluster based algorithm for black hole IDS. In 2013 annual IEEE India conference (INDICON), (Vol 13–15, pp. 1–6). Roy, D. B., & Chaki, R., (2013). MCBHIDS: Modified layered cluster based algorithm for black hole IDS. In 2013 annual IEEE India conference (INDICON), (Vol 13–15, pp. 1–6).
5.
go back to reference Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E., (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), (Vol 16–18, pp. 589–596). Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E., (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), (Vol 16–18, pp. 589–596).
6.
go back to reference Gupta, N., Singh, R.K., & Shrivastava, M., (2013). Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks. In 2013 tenth international conference on wireless and optical communications networks (WOCN) (Vol. 26–28, pp. 1–5). Gupta, N., Singh, R.K., & Shrivastava, M., (2013). Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks. In 2013 tenth international conference on wireless and optical communications networks (WOCN) (Vol. 26–28, pp. 1–5).
7.
go back to reference Singhal, S. & Daniel, A. K., (2014). Fuzzy logic based clusterhead selection protocol under Competence level, Goodness function and Mobility for mobile ad hoc network. In 2014 Conference on IT in business, industry and government (CSIBIG) (Vol. 8–9, pp. 1–6). Singhal, S. & Daniel, A. K., (2014). Fuzzy logic based clusterhead selection protocol under Competence level, Goodness function and Mobility for mobile ad hoc network. In 2014 Conference on IT in business, industry and government (CSIBIG) (Vol. 8–9, pp. 1–6).
8.
go back to reference Safdar, G. A. & McLoone, M., (2007). Randomly shifted certification authority authentication protocol for MANETs. In Mobile and wireless communications summit, 2007. 16th IST, (Vol 1–5, pp. 1–5). Safdar, G. A. & McLoone, M., (2007). Randomly shifted certification authority authentication protocol for MANETs. In Mobile and wireless communications summit, 2007. 16th IST, (Vol 1–5, pp. 1–5).
9.
go back to reference Rachedi, A., & Benslimane, A., (2006). Trust and mobility-based clustering algorithm for secure mobile ad hoc networks. In ICSNC ‘06 International conference on systems and networks communications, 2006 (pp. 72–720). Rachedi, A., & Benslimane, A., (2006). Trust and mobility-based clustering algorithm for secure mobile ad hoc networks. In ICSNC ‘06 International conference on systems and networks communications, 2006 (pp. 72–720).
10.
go back to reference Pari, S. N., Narmadhadevi, B. & Duraisamy, S., (2012). Requisite trust-based secure routing protocol for MANETs. In 2012 International conference on recent trends in information technology (ICRTIT), (Vol 19–21, pp. 276–281). Pari, S. N., Narmadhadevi, B. & Duraisamy, S., (2012). Requisite trust-based secure routing protocol for MANETs. In 2012 International conference on recent trends in information technology (ICRTIT), (Vol 19–21, pp. 276–281).
11.
go back to reference Jenitha, T., & Jayashree, P., (2014). Distributed trust node selection for secure group communication in MANET. In 2014 Fourth international conference on advances in computing and communications (ICACC), (Vol 27–29, pp. 179–182). Jenitha, T., & Jayashree, P., (2014). Distributed trust node selection for secure group communication in MANET. In 2014 Fourth international conference on advances in computing and communications (ICACC), (Vol 27–29, pp. 179–182).
12.
go back to reference Morii, K., Taketa, K., Mori, Y., Kojima, H., Kohno, E., Inoue, S., Ohta, T., & Kakuda, Y., (2012). A new generation children tracking system using bluetooth MANET composed of android mobile terminals. In Ubiquitous intelligence & computing and 9th international conference on autonomic & trusted computing (UIC/ATC), 2012, (Vol 4–7, pp. 405–407). Morii, K., Taketa, K., Mori, Y., Kojima, H., Kohno, E., Inoue, S., Ohta, T., & Kakuda, Y., (2012). A new generation children tracking system using bluetooth MANET composed of android mobile terminals. In Ubiquitous intelligence & computing and 9th international conference on autonomic & trusted computing (UIC/ATC), 2012, (Vol 4–7, pp. 405–407).
13.
go back to reference Malek, S. F., & Khorsandi, S., (2013). A cooperative intrusion detection algorithm based on trusted voting for mobile ad hoc network. In 2013 21st Iranian conference on electrical engineering (ICEE), (Vol 14–16, pp. 1–8). Malek, S. F., & Khorsandi, S., (2013). A cooperative intrusion detection algorithm based on trusted voting for mobile ad hoc network. In 2013 21st Iranian conference on electrical engineering (ICEE), (Vol 14–16, pp. 1–8).
14.
go back to reference Karygiannis, A., Antonakakis, E.& Apostolopoulos, A., (2006). Detecting critical nodes for MANET intrusion detection systems. In Second international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2006. SecPerU 2006, (Vol 29–29, pp. 9–15). Karygiannis, A., Antonakakis, E.& Apostolopoulos, A., (2006). Detecting critical nodes for MANET intrusion detection systems. In Second international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2006. SecPerU 2006, (Vol 29–29, pp. 9–15).
15.
go back to reference Vilhan, P., & Hudec, L., (2014). Cluster glue–improving service reachability in PKI enabled MANET. In 2014 UKSim-AMSS 16th international conference on computer modelling and simulation (UKSim), (Vol 26–28, pp. 494–499). Vilhan, P., & Hudec, L., (2014). Cluster glue–improving service reachability in PKI enabled MANET. In 2014 UKSim-AMSS 16th international conference on computer modelling and simulation (UKSim), (Vol 26–28, pp. 494–499).
16.
go back to reference Annadurai, P., & Vijayalaksmi, S., (2014). Identifying malicious node using trust value in cluster based MANET (IMTVCM). In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT), (Vol 10–11, pp. 1150–1158). Annadurai, P., & Vijayalaksmi, S., (2014). Identifying malicious node using trust value in cluster based MANET (IMTVCM). In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT), (Vol 10–11, pp. 1150–1158).
17.
go back to reference Chatterjee, M., Das, S. K., & Turgut, D. (2000). An on-demand weighted clustering algorithm (WCA) for ad hoc networks. In Global telecommunications conference, 2000. GLOBECOM’00, (Vol. 3, pp. 1697–1701). Chatterjee, M., Das, S. K., & Turgut, D. (2000). An on-demand weighted clustering algorithm (WCA) for ad hoc networks. In Global telecommunications conference, 2000. GLOBECOM’00, (Vol. 3, pp. 1697–1701).
18.
go back to reference Mylsamy, R. & Subranarayanan, S. (2014). A new approach to trust evaluation for cluster based MANETS. Journal of Theoretical and Applied Information Technology, 64(3), 837–844. Mylsamy, R. & Subranarayanan, S. (2014). A new approach to trust evaluation for cluster based MANETS. Journal of Theoretical and Applied Information Technology, 64(3), 837–844.
Metadata
Title
Weighted Clustering Trust Model for Mobile Ad Hoc Networks
Authors
M. Ashwin
S. Kamalraj
Mubarakali Azath
Publication date
03-06-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3371-0

Other articles of this Issue 4/2017

Wireless Personal Communications 4/2017 Go to the issue