A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET

被引:0
|
作者
Rajkumar Mylsamy
Subramanian Sankaranarayanan
机构
[1] Sri Krishna College of Engineering and Technology,Department of Information Technology
[2] Karpagam University,undefined
来源
Wireless Personal Communications | 2016年 / 86卷
关键词
Privacy; Mobile ad hoc networks (MANETs); Cluster-based; Malicious nodes; Routing security;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for trust and head selection (2PTH) algorithm is proposed for communication privacy from intermediate malicious nodes. A 2PTH algorithm is a combination of preference-based trust selection algorithm (PTA) and preference-based head election algorithm (PHA). To discover routes with trusted nodes, PTA is proposed for determining a route without malevolent nodes for forwarding packets based on Weight assignment to trust parameters. The work also proposes a PHA, based on internal and external factors of a node, aiming at finding quick response during the routing process. Simulations are performed using NS2 simulator. We compare the proposed 2PTH algorithm with other clustering algorithms, which are cluster-based trust-aware routing protocol, 2ACK model and low energy adaptive clustering hierarchy. Our analysis and simulation results show that, the proposed 2PTH algorithm efficiently detects and isolates malicious nodes, and it outperforms the other algorithms.
引用
收藏
页码:1611 / 1627
页数:16
相关论文
共 50 条
  • [21] An Efficient Cluster based Routing Protocol for MANET
    Sharma, Dhirendra Kumar
    Kumar, Chiranjeev
    Mandal, Surajit
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 224 - 229
  • [22] A Cluster-Based Feature Selection Approach
    Covoes, Thiago F.
    Hruschka, Eduardo R.
    de Castro, Leandro N.
    Santos, Atila M.
    HYBRID ARTIFICIAL INTELLIGENCE SYSTEMS, 2009, 5572 : 169 - +
  • [23] Rank and Weight Based Protocol for Cluster Head Selection for WSN
    Biradar, S. R.
    Jain, Gunjan
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 793 - 801
  • [24] Security and Pseudo-Anonymity with a Cluster-based approach for MANET
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [25] A Cluster-Based Load Balancing Between Satellite Gateways in a MANET
    Crosnier, Michael
    Dhaou, Riadh
    Planchou, Fabrice
    Beylot, Andre-Luc
    2012 6TH ADVANCED SATELLITE MULTIMEDIA SYSTEMS CONFERENCE (ASMS) AND 12TH SIGNAL PROCESSING FOR SPACE COMMUNICATIONS WORKSHOP (SPSC), 2012, : 303 - 307
  • [26] Trust Based Cluster Head Selection Algorithm for Wireless Sensor Network
    Ramalingam, L.
    Audithan, S.
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 453 - 457
  • [27] A cluster-based trust-aware routing protocol for mobile ad hoc networks
    Safa, Haidar
    Artail, Hassan
    Tabet, Diana
    WIRELESS NETWORKS, 2010, 16 (04) : 969 - 984
  • [28] A cluster-based trust-aware routing protocol for mobile ad hoc networks
    Haidar Safa
    Hassan Artail
    Diana Tabet
    Wireless Networks, 2010, 16 : 969 - 984
  • [29] Qualitative preference-based service selection for multiple agents
    Wang, Hongbing
    Zhang, Jie
    Wan, Cheng
    Shao, Shizhi
    Cohen, Robin
    Web Intelligence and Agent Systems, 2013, 11 (03): : 263 - 282
  • [30] Cluster-based On Demand Multicast Routing Protocol
    Suno, Xue-Mei
    Liu, Wen-Ju
    Zhang, Zhi-Qiang
    Zhao, You
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1439 - +