Trust Value Updation Algorithm for Multicast Routing Algorithm for Cluster Based MANET

被引:0
作者
Kulkarni, Sapna B. [1 ]
Yuvaraju, B. N. [1 ]
机构
[1] VTU Univ, NIE, Dept CSE, Mysuru, India
来源
2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET) | 2017年
关键词
Trust value; Cluster; Cluster Head; malicious node; Mobile ad hoc network (MANET);
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a cluster based routing algorithm for mobile ad hoc network cluster head plays a very important role in communication between clusters. Selection of cluster head plays a very vital role. But if the selected cluster head node itself becomes selfish or malicious node, it will affect the performance of the entire cluster communication and hence hampers the throughput and efficiency of the MANET. Trust has to be established for the all the nodes in the cluster. Hence trust management plays a very important role. Clusters are formed based on 1-Hop distance. Within the clusters trust value of all the nodes are calculated using challenge evaluation algorithm to identify malicious node and selfish node. With the help of Rating friend's algorithm a node rates its nearest neighbors so as to make the network more robust in terms of reliability and gather data about each other to populate a friends list. Later trust value is calculated for each node depending upon the above mentioned algorithms and stored in friend list. Node with a highest trust value will be considered for cluster head selection. Then considering the bandwidth, power and connectivity of the node cluster head is selected. In this paper we are proposing Trust value updation algorithm for cluster head were trust value has to be updated or refreshed for a time interval so as to select the new cluster head as the nodes are continuously moving. The effectiveness of this proposed algorithm in comparison with Power Aware On-demand Multicast Routing (PAOMR) algorithms is evaluated through simulation. The proposed in comparison to previous technique alleviates the energy consumption and provides reduced delay.
引用
收藏
页码:1246 / 1249
页数:4
相关论文
共 10 条
[1]  
Banerjee Shilpa, 2010, IEEE C EVOL COMPUTAT
[2]   Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :1001-1012
[3]  
Kulkarni Sapna B., 2015, INT J ENG TECHNOLOGY, V2
[4]  
Kulkarni Sapna B., 2016, EMERGING RES COMPUTI, DOI [10.1007/978-981-10-0287-8_45, DOI 10.1007/978-981-10-0287-8_45]
[5]  
Menaka R., 2013, INT J EMERGING TECHN, V3
[6]  
Naveen N., 2013, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), P468, DOI 10.1109/ICPRIME.2013.6496716
[7]  
Neelavathy Pari S., 2012, 2012 International Conference on Recent Trends in Information Technology (ICRTIT), P276, DOI 10.1109/ICRTIT.2012.6206806
[8]  
Sardar Mousumi, 2013, COMPUTER SCI, P243
[9]  
Wei Z, 2014, SECURITY ENHANCEMENT
[10]  
Xin Li, 2010, Proceedings of the 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2010), P773, DOI 10.1109/FSKD.2010.5569349