Cluster Computing

, Volume 22, Supplement 5, pp 10687–10695 | Cite as

Multi objective trust optimization for efficient communication in wireless M learning applications

  • M. AshwinEmail author
  • S. Kamalraj
  • M. Azath


Mobile learning (M learning) supports ubiquitous learning thus is a strong contender in distance learning. One of the challenge faced in development of m learning is an efficient and secure communication network. Mobile ad hoc network (MANET) refers to a set of wireless mobile nodes possessing no centralized architecture as well as a dynamic topology. One of the fast evolving application in MANET is mobile-learning (m learning). Security in MANET’s is a challenge due to its open medium. The routing assumes that all the nodes in the network are trustworthy which leaves the network vulnerable to attacks. Trust management schemes are popularly used for secure routing, verification, interruption location, and access control. In this work, clustering and trust is used for mitigating maliciousness and formation of clusters is optimized using heuristic method. Swarm intelligence (SI) is an efficient option for optimizing routing in a complex network situation, where traditional routing strategies come up short. Particle swarm optimization (PSO) employs the concept of social interactions to get optimal solutions. Simulation results proved that the proposed PSO with weighted trust model achieves better performance for packet delivery ratio, end to end delays as well as cluster formation in malicious environment.


M learning Mobile ad hoc network (MANETs) Trust Swarm intelligence (SI) Particle swarm optimization (PSO) 


  1. 1.
    Singh, M., Singh, M.G.: A Secure and efficient cluster head selection algorithm for MANET. J. Netw. Commun. Emerg. Technol. (JNCET) 2(2), 49–53 (2015)Google Scholar
  2. 2.
    Vasiliou, A., Economides, A.A.: Mobile collaborative learning using multicast MANETs. Int. J. Mob. Commun. 5(4), 423–444 (2007)CrossRefGoogle Scholar
  3. 3.
    Economides, A.A.: Requirements of mobile learning applications. Int. J. Innov. Learn. 5(5), 457–479 (2008)CrossRefGoogle Scholar
  4. 4.
    Raza, N., Aftab, M.U., Akbar, M.Q., Ashraf, O., Irfan, M.: Mobile ad-hoc networks applications and its challenges. Commun. Netw. 8, 131–136 (2016)CrossRefGoogle Scholar
  5. 5.
    Li, W., Wu, J., Zhang, Q., Hu, K., Li, J.: Trust-driven and QoS demand clustering analysis based cloud workflow scheduling strategies. Clust. Comput. 17(3), 1013–1030 (2014)CrossRefGoogle Scholar
  6. 6.
    Gupta, N., Shrivastava, M., Singh, A.: Survey of Routing Scheme in MANET with clustering Techniques. Int. J. Mod. Eng. Res. (IJMER) 2(6), 4180–4185 (2012)Google Scholar
  7. 7.
    Wang, Y., Chandrasekhar, S., Singhal, M., Ma, J.: A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Clust. Comput. 19(2), 647–662 (2016)CrossRefGoogle Scholar
  8. 8.
    Krishnappa, P.K., Babu, B.P.: Investigating open issues in swarm intelligence for mitigating security threats in MANET. Int. J. Electr. Comput. Eng. (IJECE) 5(5), 1194–1201 (2015)Google Scholar
  9. 9.
    Kalpana, R., Baskaran, M.: TAR: TOA-AOA based random transmission directed localization. Wirel. Pers. Commun. 90(2), 889–902 (2016)CrossRefGoogle Scholar
  10. 10.
    Singh, Y.: Clustered based mobility prediction in MANET. Int. J. Innov. Res. Sci. Technol. 2(1), 220–229 (2015)Google Scholar
  11. 11.
    Nandhini, M.J., Sharmila, D., Dhivithra, K., Balasuganya, K.S., Gowri, D.: Security based weighted cluster routing in MANET. J. Theor. Appl. Inf. Technol. 64(1), 102–106 (2014)Google Scholar
  12. 12.
    Ali, Z., Shahzad, W.: Analysis of routing protocols in AD HOC and sensor wireless networks based on swarm intelligence. Int. J. Netw. Commun. 3(1), 1–11 (2013)Google Scholar
  13. 13.
    Dixit, S., Singhai, R.: A survey paper on particle swarm optimization based routing protocols in mobile ad-hoc networks. Int. J. Comput. Appl. 119(10), 1–5 (2015)Google Scholar
  14. 14.
    Devi, G.M., Seetha, M., Sunitha, K.V.N.: A novel hybrid clustering techniques based on K-means, PSO and dynamic optimization. Int. J. Comput. Appl. 119(20), 20–25 (2015)Google Scholar
  15. 15.
    Sarkar, S., Roy, A., Purkayastha, B.S.: Application of particle swarm optimization in data clustering: a survey. Int. J. Comput. Appl. (0975–8887), 65(25), 38–46 (2013)Google Scholar
  16. 16.
    Sharma, A., Agarwal, S., Rathore, R.S.: Cluster based routing in mobile ad hoc wireless networks using neuro-genetic paradigm. Int. J. Sci. Eng. Res. 3(7), 1–5 (2012)Google Scholar
  17. 17.
    Tyagi, S., Som, S., Rana, Q.P.: Trust based dynamic multicast group routing ensuring reliability for ubiquitous environment in MANETs. Int. J. Ambient Comput. Intell. (IJACI) 8(1), 70–97 (2017)Google Scholar
  18. 18.
    Ahmed, M.N., Abdullah, A.H., Chizari, H., Kaiwartya, O.: F3TM: flooding factor based trust management framework for secure data transmission in MANETs. J. King Saud Univ. Comput. Inf. Sci. 29(3), 269–280 (2017)Google Scholar
  19. 19.
    Ashwin, M., Kamalraj, S., Azath, M.: Weighted clustering trust model for mobile ad hoc networks. Wirel. Pers. Commun. 94 (4), 2203–2212 (2017)Google Scholar
  20. 20.
    Chatterjee, M., Das, S.K., Turgut, D.: WCA: a weighted clustering algorithm for mobile ad hoc networks. Clust. Comput. 5(2), 193–204 (2002)CrossRefGoogle Scholar
  21. 21.
    Ferdous, R., Muthukkumarasamy, V., Sithirasenan, E.: Trust-based cluster head selection algorithm for mobile ad hoc networks. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 589–596 (2011)Google Scholar
  22. 22.
    El-Tarabily, M., Abdel-Kader, R., Marie, M., Abdel-Azeem, G.: A PSO-based subtractive data clustering algorithm. Int. J. Res. Comput. Sci. eISSN 3, 2249–8265 (2013)Google Scholar
  23. 23.
    Shen, H., Jin, L., Zhu, Y., Zhu, Z.: Hybridization of particle swarm optimization with the K-Means algorithm for clustering analysis. In: 2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), pp. 531–535. IEEE (2010)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringKarpagam UniversityCoimbatoreIndia
  2. 2.Department of Electronics and Communication EngineeringKarpagam UniversityCoimbatoreIndia
  3. 3.Department of CNEKing Khalid UniversityAbhaSaudi Arabia

Personalised recommendations