Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks

被引:22
作者
Ferdous, Raihana [1 ]
Muthukkumarasamy, Vallipuram [1 ]
Sithirasenan, Elankayer [1 ]
机构
[1] Griffith Univ, Griffith, NSW, Australia
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
关键词
D O I
10.1109/TrustCom.2011.76
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad hoc Networks (MANETs) consist of a large number of relatively low-powered mobile nodes communicating in a network using radio signals. Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes has one or more elected Cluster head(s), where all Cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining communication with limited energy sources for longer period of time. Misbehaving nodes and cluster heads can drain energy rapidly and reduce the total life span of the network. In this context, selection of best cluster heads with trusted information becomes critical for the overall performance. In this paper, we propose Cluster head(s) selection algorithm based on an efficient trust model. This algorithm aims to elect trustworthy stable cluster head(s) that can provide secure communication via cooperative nodes. Simulations were conducted to evaluate trusted Cluster head(s) in terms of clusters stability, longevity and throughput.
引用
收藏
页码:589 / 596
页数:8
相关论文
共 17 条
[1]  
[Anonymous], 2004, 2 WORKSH EC PEER TO
[2]  
Bechler M, 2004, IEEE INFOCOM SER, P2393
[3]   Self-policing mobile ad hoc networks by reputation systems [J].
Buchegger, S ;
Le Boudec, JY .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (07) :101-107
[4]   Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks [J].
Buchegger, S ;
Le Boudec, JY .
10TH EUROMICRO WORKSHOP ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PROCEEDINGS, 2002, :403-410
[5]  
Edith C. H. Ngai, 2004, 24 INT C DISTR COMP, V3, P23
[6]  
Fei Song, 2008, 2008 Second International Conference on Future Generation Communication and Networking (FGCN), P202, DOI 10.1109/FGCN.2008.41
[7]  
Ferdous R., 2010, P 4 IEEE INT C NETW
[8]  
Ferdous R., 2010, P 10 IEEE INT C COMP
[9]  
Handy MJ, 2002, 2002 4TH INTERNATIONAL WORKSHOP ON MOBILE AND WIRELESS COMMUNICATION NETWORK, P368, DOI 10.1109/MWCN.2002.1045790
[10]   Adaptive security design with malicious node detection in cluster-based sensor networks [J].
Hsieh, Meng-Yen ;
Huang, Yueh-Min ;
Chao, Han-Chieh .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2385-2400