Energy and Trust Management Framework for MANET using Clustering Algorithm

被引:14
作者
Gopala Krishnan, C. [1 ]
Nishan, A. H. [2 ]
Gomathi, S. [2 ]
Aravind Swaminathan, G. [2 ]
机构
[1] GITAM Univ, GITAM Sch Technol, Dept CSE, Bengaluru, India
[2] Francis Xavier Engn Coll, Dept CSE, Tirunelveli, Tamil Nadu, India
关键词
MANET; Energy efficiency; Trust framework; k-means clustering; ROUTING ALGORITHM;
D O I
10.1007/s11277-021-08948-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In General, Mobile Ad-Hoc Network (MANET) has limited energy resources, and it cannot recharge itself. This research goal focuses on building a power management scheme that saves energy in the MANET. Due to power instability, there is a chance that cluster heads fail and function incorrectly in cluster-based routing. As a result, instability occurs with the cluster heads while collecting data and communicating with others effectively. This work focuses on detecting the unstable cluster heads, which are replaced by other nodes implementing the envisaged self-configurable cluster mechanism. A self-configurable cluster mechanism with a k-means protocol approach is proposed to designate cluster heads effectively. The proposed k-means procedure is based on periodic irregular cluster head rotations or altering the number of clusters. We also propose a trust management mechanism in this research to detect and avoid MANET vulnerabilities. Because of the continuously changing topology and limited resources (power, bandwidth, computing), the trust management algorithm should only use local data. Consequently, compared to traditional protocols, the proposed approach with the k-means procedure and its experimental results show lower power usage and provide an optimal system for trust management.
引用
收藏
页码:1267 / 1281
页数:15
相关论文
共 34 条
[1]   Trust-based security for the OLSR routing protocol [J].
Adnane, Asma ;
Bidan, Christophe ;
de Sousa Junior, Rafael Timoteo .
COMPUTER COMMUNICATIONS, 2013, 36 (10-11) :1159-1171
[2]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) :280-296
[3]  
Ahmed MN, 2017, J KING SAUD UNIV-COM, V29, P269, DOI 10.1016/j.jksuci.2016.03.004
[4]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[5]   A QoS-Based Wireless Multimedia Sensor Cluster Protocol [J].
Diaz, Juan R. ;
Lloret, Jaime ;
Jimenez, Jose M. ;
Rodrigues, Joel J. P. C. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
[6]  
Fakhri, 2020, INT J ELECT COMPUTER, V10, P3715, DOI [10.11591/ijece.v10i4.pp3715-3724, DOI 10.11591/IJECE.V10I4.PP3715-3724]
[7]  
Ganeshkumar P., 2014, IEEE EXPL P INT C CO, P1808, DOI [10.1109/iccsp.2014.6950037, DOI 10.1109/ICCSP.2014.6950037]
[8]   Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol [J].
Gomathi, S. ;
Krishnan, C. Gopala .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) :1775-1790
[9]   Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey [J].
Govindan, Kannan ;
Mohapatra, Prasant .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02) :279-298
[10]   Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks [J].
He, Daojing ;
Chan, Sammy ;
Tang, Shaohua ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (09) :4638-4646