Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network

被引:10
作者
Thirunavukkarasu, V [1 ]
Kumar, A. Senthil [2 ]
Prakasam, P. [3 ]
机构
[1] Govt Coll Engn, Dept Elect & Commun Engn, Bodinayakkanur, India
[2] Kings Engn Coll, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
[3] Vellore Inst Technol, Sch Elect Engn, Vellore, Tamil Nadu, India
关键词
Mobile Adhoc Network; Routing protocol; Node credit score; Self-Trust computation; Joint-Trust computation; INTRUSION DETECTION; TASK ASSIGNMENT; ALGORITHM; SECURITY; SCHEME; MODEL;
D O I
10.1007/s12083-022-01340-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Internet of Things (IoT) is a superior technology that will connect more number of wired/wireless devices through an internet. The Mobile Adhoc Network (MANET) is s wireless system which will connect the wireless devices through low bandwidth wireless links. Hence, Integrating MANET with IoT greatly improves the performance of the IoT subject to energy constrained and trusted security. Protecting the ad hoc routing from the black hole attacks, Byzantine flooding, Location disclosure attacks etc., seems to be a very difficult issue in the previous researches. To overcome the aforementioned security issues, a novel methodology called Cluster and Angular based Energy Proficient Trusted Routing (ACEPTR) protocol is proposed in this research article. Initially, Node Credit Score (NCS) is calculated to compute trust ratio for the nodes. The credit score calculation includes both Self-Trust computation and Joint-Trust computation. Once highest NCS is computed then angular energy based route selection process is carried out to form the clusters since cluster based routing reduces energy consumption extensively. The conventional communication control process is applied for finding node's transmission range so that data can be transmitted over angular energy based highest NCS nodes. The simulation results obtained is compared with the conventional schemes and the metrics proved that the proposed scheme achieves better system performance.
引用
收藏
页码:2240 / 2252
页数:13
相关论文
共 33 条
[1]   Volunteer nodes of ant colony optimization routing for minimizing delay in peer to peer MANETs [J].
Alleema, N. Noor ;
Kumar, D. Siva .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (02) :590-600
[2]  
Bohli J.-M., 2015, 2015 international conference on recent advances in internet of things (riot), P1, DOI DOI 10.1109/RIOT.2015.7104906
[3]   An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs [J].
Cai, Ruo Jun ;
Li, Xue Jun ;
Chong, Peter Han Joo .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (01) :42-55
[4]  
Chen X, 2014, IEEE INT CONF SENS, P275, DOI 10.1109/SAHCN.2014.6990363
[5]   COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Al-Hamadi, Hamid ;
Chen, Ing-Ray .
IEEE ACCESS, 2019, 7 :92296-92313
[6]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[7]  
Dandala TT, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), P201
[8]  
Doukas C., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P922, DOI 10.1109/IMIS.2012.26
[9]   Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems [J].
Fatemidokht, Hamideh ;
Rafsanjani, Marjan Kuchaki ;
Gupta, Brij B. ;
Hsu, Ching-Hsien .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) :4757-4769
[10]   TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks [J].
Gunasekaran, Muthumanickam ;
Premalatha, Kandhasamy .
IET INFORMATION SECURITY, 2013, 7 (03) :203-211