Weighted Clustering Trust Model for Mobile Ad Hoc Networks

Mobile Adhoc Network (MANET) is a dynamic field that has acquired remarkable attention for its self-configuration and self-maintenance. It is composed of Mobile Nodes using radio links to form a network without any infrastructure. In MANETs, wireless nodes are allowed to move freely and can join/leave network. MANETs are extremely at risk to various misbehaviours due to reasons like absence of transmission infrastructures, dynamic network topologies, as well as short communicative range. For detecting as well as reducing misbehaviour, several trust management strategies were suggested for MANETs. MANETs trust migration is a level of belief according to nodes behaviour. This work investigated MANETs trust based clustering algorithm. A weighted clustering Trust model algorithm is proposed and impact of maliciousness and a cluster head selection algorithm is investigated. The simulations are conducted for without malicious nodes, 10 % malicious node and 20 % malicious node in the network with trust and without trust and for the proposed method. The packet delivery ratio improved by 16.18 % than 10 % malicious nodes with trust in the network compared with Trust model weighted clustering without malicious nodes for 40 nodes.

[1]  Peter Vilhan,et al.  Cluster Glue -- Improving Service Reachability in PKI Enabled MANET , 2014, 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation.

[2]  P. Jayashree,et al.  Distributed Trust Node Selection for Secure Group Communication in MANET , 2014, 2014 Fourth International Conference on Advances in Computing and Communications.

[3]  S. Sankaranarayanan,et al.  A NEW APPROACH TO TRUST EVALUATION FOR CLUSTER BASED MANETS , 2014 .

[4]  Abderrahim Benslimane,et al.  Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[5]  Yoshiaki Kakuda,et al.  A New Generation Children Tracking System Using Bluetooth MANET Composed of Android Mobile Terminals , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[6]  P. Annadurai,et al.  Identifying malicious node using trust value in cluster based MANET (IMTVCM) , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[7]  Neha Gupta,et al.  Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).

[8]  Rituparna Chaki,et al.  MCBHIDS: Modified layered cluster based algorithm for black hole IDS , 2013, 2013 Annual IEEE India Conference (INDICON).

[9]  S. S. Tyagi Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .

[10]  Sajal K. Das,et al.  An on-demand weighted clustering algorithm (WCA) for ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[11]  Vallipuram Muthukkumarasamy,et al.  Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  Shikha Jain Security Threats in MANETS : A Review , 2014, ArXiv.

[13]  A. K. Daniel,et al.  Fuzzy logic based clusterhead selection protocol under Competence level, Goodness funciton and Mobility for mobile ad hoc network , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).

[14]  M. McLoone,et al.  Randomly Shifted Certification Authority Authentication Protocol for MANETs , 2007 .

[15]  Seyyedeh Fatemeh Malek,et al.  A cooperative rintrusion detection algorithm based on trusted voting for mobile ad hoc network , 2013, 2013 21st Iranian Conference on Electrical Engineering (ICEE).

[16]  A. Karygiannis,et al.  Detecting critical nodes for MANET intrusion detection systems , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[17]  S. Neelavathy Pari,et al.  Requisite trust-based Secure Routing Protocol for MANETs , 2012, 2012 International Conference on Recent Trends in Information Technology.

[18]  Sanjay Kumar Dubey,et al.  Analytical Study of Cluster Based Routing Protocols in MANET , 2014 .