Reconfiguration time and complexity minimized trust-based clustering scheme for MANETs
نویسندگان
چکیده
A trust management mechanism for mobile ad hoc networks (MANETs) is proposed to cope with security issues that MANETs face due to time constraints as well as resource constraints in bandwidth, computational power, battery life, and unique wireless characteristics. The trust-based reputation scheme GlobalTrust is a reliable trust management mechanism. In this paper, a clustering algorithm is applied to the GlobalTrust scheme (named Cluster-based GlobalTrust (CGTrust)) to find the optimal group size to minimize the configuration time, which consists of trust information computational time and complexity, while having to satisfy the trust reliability requirements. The optimal number of clusters is derived from the minimizing point of the computation complexity function. Simulation results show that the computational time and complexity of CGTrust are controllable and can be used effectively in time critical network operations that require trust analysis.
منابع مشابه
A two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملTrust management in mobile ad hoc networks for bias minimization and application performance maximization
Trust management for mobile ad hoc networks (MANETs) has emerged as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile group based applications in recent years. In this paper we address the performance issue of trust management protocol design for MANETs in two important areas: trust bias minimization and application performance maximizatio...
متن کاملResisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management
Chaining-based key management schemes seem to be the ones that best fit MANETs. The main chaining-based scheme is the Self-Organized Public Key Management System (PGP-Like). However, it is fully vulnerable to impersonation attacks. In order to reduce such vulnerability, this article introduces a new public-key management system for MANETs, the Virtual Key Management System (VKM). VKM uses a vir...
متن کاملPermutation based K-Means Clustering Approach for Energy Conservation in MANETs
One of the important issue in MANETs is an energy saving and security. Each node in MANETs has limited energy resource, so that the lifetime of the network is one of the major critical issues. This paper studied SVM data aggregation method for classifying nodes according to their threshold values, this method eliminated the data redundancy and outliers but classification method is not much enou...
متن کاملMaximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterheads is the key problem of all. Traditional ways of clustering lack of instructions of trust mechanisms. This paper presents a maximum-objective-trust-based clustering solution (MOTBCS), which aims at the opinion of maxi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EURASIP J. Wireless Comm. and Networking
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017