Advertisement

SWCA Secure Weighted Clusterhead Election in Mobile Ad Hoc Network

  • Meriem Ait RahouEmail author
  • Abderrahim Hasbi
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 92)

Abstract

Mobile ad hoc networks (Manets) consist of a large number of mobile nodes communicating in a network using radio signals. Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes called cluster and has one or more elected Cluster head, where all cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, cluster heads should be capable of sustaining communication with limited energy sources for longer period of time. Misbehaving nodes and cluster heads can drain and reduce the total life span of the network. In this context, selecting the appropriate cluster heads with trusted information becomes critical for the overall performance. In this paper, we analyze the existing trust based clustering solutions, and highlight their advantages and drawbacks. Besides, we propose an efficient trust based cluster head selection.

Keywords

Manet Clustering Trust Cluster head 

References

  1. 1.
    Hussein, A., Abu Salem, A.O., Youssef, S.: A flexible weighted clustering algorithm based on battery power for mobile ad hoc networks, pp. 2012–2017 (2008).  https://doi.org/10.1109/isie.2008.4677234
  2. 2.
    Preetha, V., Chitra, K.: Clustering and cluster head selection technique in mobile ad-hoc network. Int. J. Innov. Res. Comput. Commun. Eng. 2(7), 5151–5157 (2014)Google Scholar
  3. 3.
    Ait Rahou, M., Hasbi, A.: Toward cluster head selection criterions in mobile ad hoc network. In: Noreddine, G., Kacprzyk, J. (eds.) International Conference on Information Technology and Communication Systems, ITCS 2017. Advances in Intelligent Systems and Computing, vol. 640 (2018)Google Scholar
  4. 4.
    Kwon, T.J., et al.: Efficient flooding with passive clustering an overhead-free selective forward mechanism for ad hoc/sensor networks. Proc. IEEE 91(8), 1210–1220 (2003)CrossRefGoogle Scholar
  5. 5.
    Chatterjee, M., Das, S.K., Turgut, D.: WCA: a weighted clustering algorithm for mobile adhoc networks. Clust. Comput. J. 5(2), 193–204 (2002)CrossRefGoogle Scholar
  6. 6.
    Maleknasab, M., Bidaki, M., Harounabadi, A.: Trust-based clustering in mobile ad hoc networks: challenges and issues. Int. J. Secur. Appl. 7, 321–342 (2013).  https://doi.org/10.14257/ijsia.2013.7.5.30CrossRefGoogle Scholar
  7. 7.
    Yu, Y., Zhang, L.: A secure clustering algorithm in mobile ad hoc networks. In: 2012 IACSIT Hong Kong Conferences, vol. 29 (2012)Google Scholar
  8. 8.
    Dahane, A., Berrached, N., Kechar, B.: Energy efficient and safe weighted clustering algorithm for mobile wireless sensor networks. Procedia Comput. Sci. 34, 63–70 (2014).  https://doi.org/10.1016/j.procs.2014.07.040. ISSN 1877-0509CrossRefGoogle Scholar
  9. 9.
    Gupta, N., Singh, R.K., Shrivastava, M.: Cluster formation through improved weighted clustering algorithm IWCA for mobile ad-hoc networks. In: 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN), Bhopal, pp. 1–5 (2013)Google Scholar
  10. 10.
    Ashwin, M., Kamalraj, S., Azath, M.: Wirel. Personal Commun. 94, 2203 (2017).  https://doi.org/10.1007/s11277-016-3371-0CrossRefGoogle Scholar
  11. 11.
    Elhdhili, M.E., Ben Azzouz, L., Kamoun, F.: CASAN: clustering algorithm for security in ad hoc networks. Comput. Commun. 31(13), 2972–2980 (2008).  https://doi.org/10.1016/j.comcom.2008.04.001. ISSN 0140-3664. http://www.sciencedirect.com/science/article/pii/S0140366408002077 (2018)
  12. 12.
    Gomathi, K., Parvathavarthini, B.: A secure clustering in MANET through direct trust evaluation technique. In: International Conference on Cloud Computing (ICCC), Riyadh (2015).  https://doi.org/10.1109/CLOUDCOMP.2015.7149624
  13. 13.
    Peng, S., Jia, W., Wang, G.: Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Shanghai, pp. 3–9 (2008).  https://doi.org/10.1109/euc.2008.93
  14. 14.
    Kadri, B., Mhamed, A., Feham, M.: Secured clustering algorithm for mobile ad hoc networks. Int. J. Comput. Sci. Netw. Secur. 7(3), 27–34 (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Mohammadia School of EngineersMohamed 5 UniversityRabatMorocco

Personalised recommendations