Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

01.12.2017 | Sonderheft 5/2019

Cluster Computing 5/2019

Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation

Zeitschrift:
Cluster Computing > Sonderheft 5/2019
Autoren:
G. Venkata Swaroop, G. Murugaboopathi

Abstract

Mobile ad hoc networks (MANETs) have received increasing attention due to their ease of deployment and mobility. However, MANETs are more suspicious to various malicious activates and unauthorized access. In order to overcome this issue, we have proposed a cluster based certificate revocation method to isolate the malicious node and prevent the unauthorized access. The proposed algorithm effectively used to solve security issues in MANET. The proposed framework is demonstrated as following blocks, namely, cluster construction, cluster head selection, certificate authority, node classification, certificate revocation and evaluation of false accusations. Especially, we have proposed ECMS algorithm for identifying the best cluster head in each cluster. The ECMS algorithm is stands for energy (E), connectivity (C), mobility (M) and signal to noise ratio (S). The sensor nodes present in the network are classified into three types, namely, normal node, warned node, and revoked node. In certificate revocation procedure, every node present in the network is monitored with the help of one-hop neighbours. These neighbours are also used to collect the malicious information about the sensor nodes. If any node is wrongly identified as a malicious node then its legitimate nodes send the vindication packets (VPs) to the appropriate gateways to correct the mistake. The performance of the proposed cluster based certificate revocation method is evaluated on the basis of various parameters it includes successful certification ratio (SSR), settling time (ST), average certification delay (ACD), packet delivery ratio, normalized overhead (NRO), end-to-end delay and throughput. The simulation results of the proposed algorithm are compared with the trust based algorithm, non-voting based algorithm and voting based algorithm. The experimental results proved the good performance of the proposed cluster based certificate revocation method.

Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Umwelt
  • Maschinenbau + Werkstoffe




Testen Sie jetzt 30 Tage kostenlos.

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Testen Sie jetzt 30 Tage kostenlos.

Literatur
Über diesen Artikel

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe

Premium Partner

    Bildnachweise