A novel cluster-based traffic analysis using trust computation in mobile ad hoc network
-
https://doi.org/10.14419/ijet.v7i4.22845
Received date: December 2, 2018
Accepted date: December 2, 2018
Published date: April 21, 2019
-
MANET, Traffic Analysis, Clustering, Trust Calculation, Reactive, on-Demand. -
Abstract
Mobile Ad-hoc Network (MANET) is a wireless network which is mobile and is deployed for an immediate or short-term purpose. MANETs operate by sharing information among its neighbors. Every node in a MANET utilizes responsibility for information flow since central coordination is absent. Hence, every node in a MANET completely trusts its neighbors for information distribution. Nodes in a MANET are vulnerable to several security threats which seek to use the weaknesses of the network. In this paper, a novel cluster-based traffic analysis is a reactive on-demand method for secured routing. This proposed methodology explains the method to overcome the traffic in the MANET by using trust-based cluster method.
-
References
- Usman, Muhammad, et al. "QASEC: A secured data communica-tion scheme for mobile Ad-hoc networks." Future Generation Computer Systems (2018). https://doi.org/10.1016/j.future.2018.05.007.
- Sen, Biswaraj, et al. "A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET." Advanced Computa-tional and Communication Paradigms. Springer, Singapore, 2018. 765-775. https://doi.org/10.1007/978-981-10-8237-5_74.
- Liu, Gao, Zheng Yan, and Witold Pedrycz. "Data collection for at-tack detection and security measurement in mobile ad hoc networks: A survey." Journal of Network and Computer Applications (2018). https://doi.org/10.1016/j.jnca.2018.01.004.
- Vanamala, C. K., and G. Raghvendra Rao. "SC-MANET: Threats, Risk and Solution Strategies for Security Concerns in Mobile Ad-Hoc Network." Computer Science Online Conference. Springer, Cham, 2018. https://doi.org/10.1007/978-3-319-91192-2_30.
- Mehra, Ankush. "TO ENHANCE THE SECURITY AND IM-PROVE THE PERFORMANCE OF AODV PROTOCOL IN MANET USING DELAY PER HOP TECHNIQUE." Global Journal of Computers & Technology 6.2 (2018): 354-365.
- Srinivasan, A., and Shaik Naseera. "Trust and location-based service in mobile social networks–A survey." Multiagent and Grid Sys-tems 14.3 (2018): 263-282. https://doi.org/10.3233/MGS-180291.
- Borkar, Gautam M., and A. R. Mahajan. "A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks." Wireless Networks 23.8 (2017): 2455-2472. https://doi.org/10.1007/s11276-016-1287-y.
- Qi, Huamei, et al. "A Robust and Energy-Efficient Weighted Clus-tering Algorithm on Mobile Ad Hoc Sensor Net-works." Algorithms 11.8 (2018): 116. https://doi.org/10.3390/a11080116.
- Sugumar, Rajendran, Alwar Rengarajan, and Chinnappan Jaya-kumar. "Trust-based authentication technique for cluster-based ve-hicular ad hoc networks (VANET)." Wireless Networks 24.2 (2018): 373-382. https://doi.org/10.1007/s11276-016-1336-6.
- Oubabas, Sarah, et al. "Secure and stable Vehicular Ad Hoc Net-work clustering algorithm based on hybrid mobility similarities and trust management scheme." Vehicular Communications 13 (2018): 128-138. https://doi.org/10.1016/j.vehcom.2018.08.001.
- Bala, K., S. Jothi, and A. Chandrasekar. "An enhanced intrusion detection system for mobile ad-hoc network based on traffic analy-sis." Cluster Computing (2018): 1-8. https://doi.org/10.1007/s10586-018-2545-9.
- Zhang, Wei, et al. "A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks." The Journal of Supercomputing 74.4 (2018): 1779-1801. https://doi.org/10.1007/s11227-017-2150-3.
-
Downloads
-
How to Cite
Dheepak, T., & Neduncheliyan, S. (2019). A novel cluster-based traffic analysis using trust computation in mobile ad hoc network. International Journal of Engineering and Technology, 7(4), 5940-5944. https://doi.org/10.14419/ijet.v7i4.22845
