Reconfiguration time and complexity minimized trust-based clustering scheme for MANETs

نویسندگان

  • Sunho Seo
  • Jin-Won Kim
  • Jae-Dong Kim
  • Jong-Moon Chung
چکیده

A trust management mechanism for mobile ad hoc networks (MANETs) is proposed to cope with security issues that MANETs face due to time constraints as well as resource constraints in bandwidth, computational power, battery life, and unique wireless characteristics. The trust-based reputation scheme GlobalTrust is a reliable trust management mechanism. In this paper, a clustering algorithm is applied to the GlobalTrust scheme (named Cluster-based GlobalTrust (CGTrust)) to find the optimal group size to minimize the configuration time, which consists of trust information computational time and complexity, while having to satisfy the trust reliability requirements. The optimal number of clusters is derived from the minimizing point of the computation complexity function. Simulation results show that the computational time and complexity of CGTrust are controllable and can be used effectively in time critical network operations that require trust analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Trust management in mobile ad hoc networks for bias minimization and application performance maximization

Trust management for mobile ad hoc networks (MANETs) has emerged as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile group based applications in recent years. In this paper we address the performance issue of trust management protocol design for MANETs in two important areas: trust bias minimization and application performance maximizatio...

متن کامل

Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management

Chaining-based key management schemes seem to be the ones that best fit MANETs. The main chaining-based scheme is the Self-Organized Public Key Management System (PGP-Like). However, it is fully vulnerable to impersonation attacks. In order to reduce such vulnerability, this article introduces a new public-key management system for MANETs, the Virtual Key Management System (VKM). VKM uses a vir...

متن کامل

Permutation based K-Means Clustering Approach for Energy Conservation in MANETs

One of the important issue in MANETs is an energy saving and security. Each node in MANETs has limited energy resource, so that the lifetime of the network is one of the major critical issues. This paper studied SVM data aggregation method for classifying nodes according to their threshold values, this method eliminated the data redundancy and outliers but classification method is not much enou...

متن کامل

Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks

In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterheads is the key problem of all. Traditional ways of clustering lack of instructions of trust mechanisms. This paper presents a maximum-objective-trust-based clustering solution (MOTBCS), which aims at the opinion of maxi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • EURASIP J. Wireless Comm. and Networking

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017