AUTHORS: Janani V. S., M. S. K. Manikandan
Download as PDF
ABSTRACT: Mobile Ad-hoc Networks (MANET) are susceptible to several attacks due to the salient characteristics of mobile nodes. However, the major challenge to ensure secures network functionality. Trust has been recently recommended as an effective mechanism to meet this challenge. In this paper, we propose and analyze mobility aware distributed trust based hexagonal clustering scheme (HTMAC) to secure MANETs. In contrast to the existing clustering techniques, we present a distributed hexagonal clustering model with Voronoi technique where trust accomplished. To increase the spatial reuse, the network areas are clustered into congruent hexagons with Voronoi geometric features. Each node in the proposed scheme computes the trustworthiness of to enhance the security. For scalability and dynamic reconfigurability, we consider a clusterbased approach by which nodes are broken into subgroups. Headers in the clusters securely communicate with each other to agree on a network functionalities and node mobility-instigated events. Relevant simulation results demonstrate that our clustering model is efficient to guarantee a secured and mobility-adaptive ad-hoc network with trustworthy mobile nodes.
KEYWORDS: Trust, Voronoi, Hexagonal Clustering, MANET, Mobility, Security.
REFERENCES:
[1] Ratish Agarwal and Dr. Mahesh Motwani, “Survey of clustering algorithms for MANET”, International Journal on Computer Science and Engineering Vol.1, issue: 2, 2009, pp. 98-104.
[2] Abdelhak Bentaleb, Abdelhak Boubetra, Saad Harous, “Survey of Clustering Schemes in Mobile Ad hoc Networks”, Communications and Network, 2013, pp 8- 14.
[3] J.Y. Yu, P.H.J. Chong, A survey of clustering schemes for mobile ad hoc networks, IEEE Communications Surveys and Tutorials 7 (2005), https://dx.doi.org/10.1109/COMST. 2005.1423333.
[4] M. Ni, Z. Zhong and D. Zhao. “MPBC: A Mobility Prediction-Based Clustering Scheme for Ad Hoc Networks,” IEEE TVT, Vol. 60, No. 9, 2011.
[5] P. Basu, N. Khan, and T. D. C. Little, “A Mobility Based Metric for Clustering in Mobile Ad Hoc Networks,” in Proc. IEEE ICDCSW’ 01, Apr. 2001, pp. 413–18.
[6] Y. Zhuang, T. A. Gulliver, and Y. Coady, “On Planar Tessellations and Interference Estimation in Wireless Ad-Hoc Networks”, IEEE Wireless Communication Letters, Vol.2, No. 3, 2013.
[7] J.H. Cho, K.S. Chan, I.R. Chen, “Composite trust-based public key management in mobile ad hoc networks”, ACM 28th Symposium on Applied Computing, Coimbra, Portugal, 2013.
[8] R. Ferdous, V. Muthukkumarasamy, and E. Sithirasenan, “Trust-based cluster head selection algorithm for mobile ad hoc networks”, Proc.Int. Joint Conf. IEEE TrustCom, 2011.
[9] Z.Wei, H.Tang, F. Richard Yu, M. Wang, and P. Mason, “Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning”, IEEE Transaction on Vehicular Technology, Vol. 63, No. 9, 2014.
[10] K. Liu, N. Abu-Ghazaleh, K. Kang, “Location verification and trust management for resilient geographic routing', 2007.
[11] J.-H. Cho and I.-R. C. Kevin Chan, “A composite trust-based public key management in mobile ad-hoc networks,” ACM 28th Symposium on Applied Computing, Trust, Reputation, Evidence and other Collaboration Know-how (TRECK), March 2013.
[12] Fan.P, Li.G, Kai Cai, and Letaief.K.B, “On the Geometrical Characteristic of Wireless Ad-Hoc Networks and its Application in Network Performance Analysis”, IEEE Transaction on Wireless Communications, Vol. 6, No. 4, 2007, pp 1256 - 1265.
[13] Kao.B, Lee. S.D, Lee.F, Cheung.D, and Ho.W.S, “Clustering Uncertain Data Using Voronoi Diagrams and R-Tree Index”, IEEE Trans. Knowledge and Data Eng, vol. 22, no. 9,2010, pp 1219 - 1233.
[14] Stojmenovic.I, Ruhil.A.P and Lobiyal.D.K, “Voronoi diagram and convex hull based geocasting and routing in wireless networks”, Wireless. Communications and Mobile Computing,vol 6,2006, pp 247-258.
[15] Zhuang.Y, Gulliver. T. A, and Coady.Y, “On Planar Tessellations and Interference Estimation in Wireless Ad-Hoc Networks”, IEEE Wireless Communication Letters, Vol.2, No. 3, 2013, pp 331 - 334.
[16] Jingwei.H and David.N, “A calculus of trust and its application to pki and identity management”, In Proc. 8th Symposium on Identity and Trust on the Internet, 2009, pp 23-37.
[17] Jiang, M., Li, J., & Tay, Y. C, “Cluster based routing protocol (cbrp)’, Internet Draft, MANET working group, 1999.
[18] Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K., “An acknowledgmentbased approach for the detection of routing misbehavior in MANETs’, IEEE Transactions on Mobile Computing, 2007, pp 536–550.
[19] H. Safa, H. Artail, and D. Tabet, “A clusterbased trust-aware routing protocol for mobile ad hoc networks,” Wireless Networks, vol. 16, no. 4, 2010, pp. 969–984.