A novel cluster-based traffic analysis using trust computation in mobile ad hoc network

  • Authors

    • T. Dheepak Department of Computer Science, Research & Development Centre, Bharathiar University Coimbatore, Tamil Nadu, India
    • S. Neduncheliyan Principal, Jaya College of Engineering & Technology, Chennai, Tamilnadu, India
    2019-04-21
    https://doi.org/10.14419/ijet.v7i4.22845
  • MANET, Traffic Analysis, Clustering, Trust Calculation, Reactive, on-Demand.
  • Mobile Ad-hoc Network (MANET) is a wireless network which is mobile and is deployed for an immediate or short-term purpose. MANETs operate by sharing information among its neighbors. Every node in a MANET utilizes responsibility for information flow since central coordination is absent. Hence, every node in a MANET completely trusts its neighbors for information distribution. Nodes in a MANET are vulnerable to several security threats which seek to use the weaknesses of the network. In this paper, a novel cluster-based traffic analysis is a reactive on-demand method for secured routing. This proposed methodology explains the method to overcome the traffic in the MANET by using trust-based cluster method.

     

     

  • References

    1. [1] Usman, Muhammad, et al. "QASEC: A secured data communication scheme for mobile Ad-hoc networks." Future Generation Computer Systems (2018). https://doi.org/10.1016/j.future.2018.05.007.

      [2] Sen, Biswaraj, et al. "A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET." Advanced Computational and Communication Paradigms. Springer, Singapore, 2018. 765-775. https://doi.org/10.1007/978-981-10-8237-5_74.

      [3] Liu, Gao, Zheng Yan, and Witold Pedrycz. "Data collection for attack detection and security measurement in mobile ad hoc networks: A survey." Journal of Network and Computer Applications (2018). https://doi.org/10.1016/j.jnca.2018.01.004.

      [4] Vanamala, C. K., and G. Raghvendra Rao. "SC-MANET: Threats, Risk and Solution Strategies for Security Concerns in Mobile Ad-Hoc Network." Computer Science Online Conference. Springer, Cham, 2018. https://doi.org/10.1007/978-3-319-91192-2_30.

      [5] Mehra, Ankush. "TO ENHANCE THE SECURITY AND IMPROVE THE PERFORMANCE OF AODV PROTOCOL IN MANET USING DELAY PER HOP TECHNIQUE." Global Journal of Computers & Technology 6.2 (2018): 354-365.

      [6] Srinivasan, A., and Shaik Naseera. "Trust and location-based service in mobile social networks–A survey." Multiagent and Grid Systems 14.3 (2018): 263-282. https://doi.org/10.3233/MGS-180291.

      [7] Borkar, Gautam M., and A. R. Mahajan. "A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks." Wireless Networks 23.8 (2017): 2455-2472. https://doi.org/10.1007/s11276-016-1287-y.

      [8] Qi, Huamei, et al. "A Robust and Energy-Efficient Weighted Clustering Algorithm on Mobile Ad Hoc Sensor Networks." Algorithms 11.8 (2018): 116. https://doi.org/10.3390/a11080116.

      [9] Sugumar, Rajendran, Alwar Rengarajan, and Chinnappan Jayakumar. "Trust-based authentication technique for cluster-based vehicular ad hoc networks (VANET)." Wireless Networks 24.2 (2018): 373-382. https://doi.org/10.1007/s11276-016-1336-6.

      [10] Oubabas, Sarah, et al. "Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme." Vehicular Communications 13 (2018): 128-138. https://doi.org/10.1016/j.vehcom.2018.08.001.

      [11] Bala, K., S. Jothi, and A. Chandrasekar. "An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis." Cluster Computing (2018): 1-8. https://doi.org/10.1007/s10586-018-2545-9.

      [12] Zhang, Wei, et al. "A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks." The Journal of Supercomputing 74.4 (2018): 1779-1801. https://doi.org/10.1007/s11227-017-2150-3.

  • Downloads

  • How to Cite

    Dheepak, T., & Neduncheliyan, S. (2019). A novel cluster-based traffic analysis using trust computation in mobile ad hoc network. International Journal of Engineering & Technology, 7(4), 5940-5944. https://doi.org/10.14419/ijet.v7i4.22845