Login



Other Articles by Author(s)

Janani V. S.
M. S. K. Manikandan



Author(s) and WSEAS

Janani V. S.
M. S. K. Manikandan


WSEAS Transactions on Communications


Print ISSN: 1109-2742
E-ISSN: 2224-2864

Volume 17, 2018

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



Mobility Aware Voronoi Hexagonal Clustering Scheme with Trust for Securing Mobile Ad-Hoc Networks

AUTHORS: Janani V. S., M. S. K. Manikandan

Download as PDF

ABSTRACT: Mobile Ad-hoc Networks (MANET) are susceptible to several attacks due to the salient characteristics of mobile nodes. However, the major challenge to ensure secures network functionality. Trust has been recently recommended as an effective mechanism to meet this challenge. In this paper, we propose and analyze mobility aware distributed trust based hexagonal clustering scheme (HTMAC) to secure MANETs. In contrast to the existing clustering techniques, we present a distributed hexagonal clustering model with Voronoi technique where trust accomplished. To increase the spatial reuse, the network areas are clustered into congruent hexagons with Voronoi geometric features. Each node in the proposed scheme computes the trustworthiness of to enhance the security. For scalability and dynamic reconfigurability, we consider a clusterbased approach by which nodes are broken into subgroups. Headers in the clusters securely communicate with each other to agree on a network functionalities and node mobility-instigated events. Relevant simulation results demonstrate that our clustering model is efficient to guarantee a secured and mobility-adaptive ad-hoc network with trustworthy mobile nodes.

KEYWORDS: Trust, Voronoi, Hexagonal Clustering, MANET, Mobility, Security.

REFERENCES:

[1] Ratish Agarwal and Dr. Mahesh Motwani, “Survey of clustering algorithms for MANET”, International Journal on Computer Science and Engineering Vol.1, issue: 2, 2009, pp. 98-104.

[2] Abdelhak Bentaleb, Abdelhak Boubetra, Saad Harous, “Survey of Clustering Schemes in Mobile Ad hoc Networks”, Communications and Network, 2013, pp 8- 14.

[3] J.Y. Yu, P.H.J. Chong, A survey of clustering schemes for mobile ad hoc networks, IEEE Communications Surveys and Tutorials 7 (2005), https://dx.doi.org/10.1109/COMST. 2005.1423333.

[4] M. Ni, Z. Zhong and D. Zhao. “MPBC: A Mobility Prediction-Based Clustering Scheme for Ad Hoc Networks,” IEEE TVT, Vol. 60, No. 9, 2011.

[5] P. Basu, N. Khan, and T. D. C. Little, “A Mobility Based Metric for Clustering in Mobile Ad Hoc Networks,” in Proc. IEEE ICDCSW’ 01, Apr. 2001, pp. 413–18.

[6] Y. Zhuang, T. A. Gulliver, and Y. Coady, “On Planar Tessellations and Interference Estimation in Wireless Ad-Hoc Networks”, IEEE Wireless Communication Letters, Vol.2, No. 3, 2013.

[7] J.H. Cho, K.S. Chan, I.R. Chen, “Composite trust-based public key management in mobile ad hoc networks”, ACM 28th Symposium on Applied Computing, Coimbra, Portugal, 2013.

[8] R. Ferdous, V. Muthukkumarasamy, and E. Sithirasenan, “Trust-based cluster head selection algorithm for mobile ad hoc networks”, Proc.Int. Joint Conf. IEEE TrustCom, 2011.

[9] Z.Wei, H.Tang, F. Richard Yu, M. Wang, and P. Mason, “Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning”, IEEE Transaction on Vehicular Technology, Vol. 63, No. 9, 2014.

[10] K. Liu, N. Abu-Ghazaleh, K. Kang, “Location verification and trust management for resilient geographic routing', 2007.

[11] J.-H. Cho and I.-R. C. Kevin Chan, “A composite trust-based public key management in mobile ad-hoc networks,” ACM 28th Symposium on Applied Computing, Trust, Reputation, Evidence and other Collaboration Know-how (TRECK), March 2013.

[12] Fan.P, Li.G, Kai Cai, and Letaief.K.B, “On the Geometrical Characteristic of Wireless Ad-Hoc Networks and its Application in Network Performance Analysis”, IEEE Transaction on Wireless Communications, Vol. 6, No. 4, 2007, pp 1256 - 1265.

[13] Kao.B, Lee. S.D, Lee.F, Cheung.D, and Ho.W.S, “Clustering Uncertain Data Using Voronoi Diagrams and R-Tree Index”, IEEE Trans. Knowledge and Data Eng, vol. 22, no. 9,2010, pp 1219 - 1233.

[14] Stojmenovic.I, Ruhil.A.P and Lobiyal.D.K, “Voronoi diagram and convex hull based geocasting and routing in wireless networks”, Wireless. Communications and Mobile Computing,vol 6,2006, pp 247-258.

[15] Zhuang.Y, Gulliver. T. A, and Coady.Y, “On Planar Tessellations and Interference Estimation in Wireless Ad-Hoc Networks”, IEEE Wireless Communication Letters, Vol.2, No. 3, 2013, pp 331 - 334.

[16] Jingwei.H and David.N, “A calculus of trust and its application to pki and identity management”, In Proc. 8th Symposium on Identity and Trust on the Internet, 2009, pp 23-37.

[17] Jiang, M., Li, J., & Tay, Y. C, “Cluster based routing protocol (cbrp)’, Internet Draft, MANET working group, 1999.

[18] Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K., “An acknowledgmentbased approach for the detection of routing misbehavior in MANETs’, IEEE Transactions on Mobile Computing, 2007, pp 536–550.

[19] H. Safa, H. Artail, and D. Tabet, “A clusterbased trust-aware routing protocol for mobile ad hoc networks,” Wireless Networks, vol. 16, no. 4, 2010, pp. 969–984.

WSEAS Transactions on Communications, ISSN / E-ISSN: 1109-2742 / 2224-2864, Volume 17, 2018, Art. #3, pp. 18-28


Copyright © 2018 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site