A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET

被引:0
作者
Rajkumar Mylsamy
Subramanian Sankaranarayanan
机构
[1] Sri Krishna College of Engineering and Technology,Department of Information Technology
[2] Karpagam University,undefined
来源
Wireless Personal Communications | 2016年 / 86卷
关键词
Privacy; Mobile ad hoc networks (MANETs); Cluster-based; Malicious nodes; Routing security;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for trust and head selection (2PTH) algorithm is proposed for communication privacy from intermediate malicious nodes. A 2PTH algorithm is a combination of preference-based trust selection algorithm (PTA) and preference-based head election algorithm (PHA). To discover routes with trusted nodes, PTA is proposed for determining a route without malevolent nodes for forwarding packets based on Weight assignment to trust parameters. The work also proposes a PHA, based on internal and external factors of a node, aiming at finding quick response during the routing process. Simulations are performed using NS2 simulator. We compare the proposed 2PTH algorithm with other clustering algorithms, which are cluster-based trust-aware routing protocol, 2ACK model and low energy adaptive clustering hierarchy. Our analysis and simulation results show that, the proposed 2PTH algorithm efficiently detects and isolates malicious nodes, and it outperforms the other algorithms.
引用
收藏
页码:1611 / 1627
页数:16
相关论文
共 50 条
  • [41] Cluster-based architecture for parallel learning of latent dirichlet allocation
    Tu, Xionggang
    Chen, Jun
    Yang, Lu
    Yan, Jianfeng
    Journal of Computational Information Systems, 2015, 11 (02): : 399 - 407
  • [42] Capacity Research in Cluster-Based Underwater Wireless Sensor Networks Based on Stochastic Geometry
    Li, Xia
    Zhao, Dongxue
    CHINA COMMUNICATIONS, 2017, 14 (06) : 80 - 87
  • [43] A Cluster-based File Replication Scheme for DHT-based File Backup Systems
    Dinh Nghia Nguyen
    Xuan Hoang Tran
    Hoai Son Nguyen
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2016, : 204 - 209
  • [44] Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms
    John, Ayuba
    Isnin, Ismail Fauzi Bin
    Madni, Syed Hamid Hussain
    Faheem, Muhammed
    INTELLIGENT SYSTEMS WITH APPLICATIONS, 2024, 22
  • [45] Capacity Research in Cluster-Based Underwater Wireless Sensor Networks Based on Stochastic Geometry
    Xia Li
    Dongxue Zhao
    中国通信, 2017, 14 (06) : 80 - 87
  • [46] Cluster-Based Epidemic Control through Smartphone-Based Body Area Networks
    Zhang, Zhaoyang
    Wang, Honggang
    Wang, Chonggang
    Fang, Hua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (03) : 681 - 690
  • [47] An algorithm for determining data forwarding strategy based on recommended trust value in MANET
    Xu, Jianbo
    Feng, Shu
    Liang, Wei
    Ke, Jian
    Meng, Xiangwei
    Zhang, Ruili
    Shou, Danping
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 544 - 553
  • [48] Federated Aggregation With Interlayer Personalized Contribution: Preference-Based Optimization Between Performance and Privacy
    Sun, Xiaoting
    Li, Zhong
    Jiang, Changjun
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2025,
  • [49] Secure Communication of Cluster-based Ad Hoc Networks using ID-based Cryptography
    Zhou, Nanrun
    Wan, Hui
    ISAPE 2008: THE 8TH INTERNATIONAL SYMPOSIUM ON ANTENNAS, PROPAGATION AND EM THEORY, PROCEEDINGS, VOLS 1-3, 2008, : 1482 - 1485
  • [50] A Novel Cluster-based Data Fusion Algorithm for Wireless Sensor Networks
    Yue, Jun
    Zhang, Weiming
    Xiao, Weidong
    Tang, Daquan
    Tang, Jiuyang
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,