A novel cluster-based traffic analysis using trust computation in mobile ad hoc network

Authors

  • T. Dheepak

    Department of Computer Science, Research & Development Centre, Bharathiar University Coimbatore, Tamil Nadu, India
  • S. Neduncheliyan

    Principal, Jaya College of Engineering & Technology, Chennai, Tamilnadu, India

How to Cite

Dheepak, T., & Neduncheliyan, S. (2019). A novel cluster-based traffic analysis using trust computation in mobile ad hoc network. International Journal of Engineering and Technology, 7(4), 5940-5944. https://doi.org/10.14419/ijet.v7i4.22845

Received date: December 2, 2018

Accepted date: December 2, 2018

Published date: April 21, 2019

DOI:

https://doi.org/10.14419/ijet.v7i4.22845

Keywords:

MANET, Traffic Analysis, Clustering, Trust Calculation, Reactive, on-Demand.

Abstract

Mobile Ad-hoc Network (MANET) is a wireless network which is mobile and is deployed for an immediate or short-term purpose. MANETs operate by sharing information among its neighbors. Every node in a MANET utilizes responsibility for information flow since central coordination is absent. Hence, every node in a MANET completely trusts its neighbors for information distribution. Nodes in a MANET are vulnerable to several security threats which seek to use the weaknesses of the network. In this paper, a novel cluster-based traffic analysis is a reactive on-demand method for secured routing. This proposed methodology explains the method to overcome the traffic in the MANET by using trust-based cluster method.

 

 

References

  1. [1] Usman, Muhammad, et al. "QASEC: A secured data communication scheme for mobile Ad-hoc networks." Future Generation Computer Systems (2018). https://doi.org/10.1016/j.future.2018.05.007.

    [2] Sen, Biswaraj, et al. "A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET." Advanced Computational and Communication Paradigms. Springer, Singapore, 2018. 765-775. https://doi.org/10.1007/978-981-10-8237-5_74.

    [3] Liu, Gao, Zheng Yan, and Witold Pedrycz. "Data collection for attack detection and security measurement in mobile ad hoc networks: A survey." Journal of Network and Computer Applications (2018). https://doi.org/10.1016/j.jnca.2018.01.004.

    [4] Vanamala, C. K., and G. Raghvendra Rao. "SC-MANET: Threats, Risk and Solution Strategies for Security Concerns in Mobile Ad-Hoc Network." Computer Science Online Conference. Springer, Cham, 2018. https://doi.org/10.1007/978-3-319-91192-2_30.

    [5] Mehra, Ankush. "TO ENHANCE THE SECURITY AND IMPROVE THE PERFORMANCE OF AODV PROTOCOL IN MANET USING DELAY PER HOP TECHNIQUE." Global Journal of Computers & Technology 6.2 (2018): 354-365.

    [6] Srinivasan, A., and Shaik Naseera. "Trust and location-based service in mobile social networks–A survey." Multiagent and Grid Systems 14.3 (2018): 263-282. https://doi.org/10.3233/MGS-180291.

    [7] Borkar, Gautam M., and A. R. Mahajan. "A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks." Wireless Networks 23.8 (2017): 2455-2472. https://doi.org/10.1007/s11276-016-1287-y.

    [8] Qi, Huamei, et al. "A Robust and Energy-Efficient Weighted Clustering Algorithm on Mobile Ad Hoc Sensor Networks." Algorithms 11.8 (2018): 116. https://doi.org/10.3390/a11080116.

    [9] Sugumar, Rajendran, Alwar Rengarajan, and Chinnappan Jayakumar. "Trust-based authentication technique for cluster-based vehicular ad hoc networks (VANET)." Wireless Networks 24.2 (2018): 373-382. https://doi.org/10.1007/s11276-016-1336-6.

    [10] Oubabas, Sarah, et al. "Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme." Vehicular Communications 13 (2018): 128-138. https://doi.org/10.1016/j.vehcom.2018.08.001.

    [11] Bala, K., S. Jothi, and A. Chandrasekar. "An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis." Cluster Computing (2018): 1-8. https://doi.org/10.1007/s10586-018-2545-9.

    [12] Zhang, Wei, et al. "A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks." The Journal of Supercomputing 74.4 (2018): 1779-1801. https://doi.org/10.1007/s11227-017-2150-3.

Downloads

How to Cite

Dheepak, T., & Neduncheliyan, S. (2019). A novel cluster-based traffic analysis using trust computation in mobile ad hoc network. International Journal of Engineering and Technology, 7(4), 5940-5944. https://doi.org/10.14419/ijet.v7i4.22845

Received date: December 2, 2018

Accepted date: December 2, 2018

Published date: April 21, 2019