Skip to main content

Advertisement

Log in

Trust Management Framework and High Energy Efficient Lifetime Management System for MANET using Self-Configurable Cluster Mechanism

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The maximum hard side of MANET is that they’re power resource-limited wherein energy cannot be replenished. Our evaluation intention is to give a high power saving management system for MANET. Cluster approaches in MANET make other nodes into small disjoint groups, wherever every cluster node encompasses an organizer known as CH (Cluster Head). The primary difficult task within the methods is retaining created clusters. To decide any node as Cluster Head, it’s very essential to summarize its constraints and eligibility which is supported by the information of the node’s properties like its remaining power or energy. There may be a possibility of the Cluster Heads might be unsuccessful and act wrongly due to power instability. During failure, the Cluster Heads are unable to collect the date and transfer information well. This influences the effectiveness of the MANET. We can decrease the information failure by detecting the failure of CH earlier, and also it needs the lowest improvement efforts. A self-configurable cluster mechanism is proposed. We planned to identify the unstable Cluster Heads and soon it will be replaced by some other nodes. k-means protocol method has been developed to select Cluster Heads effectively. This protocol (k-means) operates on an interval or periodic irregular rotations of the Cluster Heads and some of the clusters vary between 0 and 1. If the arbitrary number is smaller than the pre-decided preset (threshold) value, the node becomes a Cluster Heads for the existing round. We’ve achieved and realized a decrease in power and energy loss in comparison to other protocols like transmission and direct communication protocols. The experimental result suggests that the proposed scheme works properly in a reduction in energy dissipation compared to other protocols like transmission and direct communication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Ahmed, A., Abu Bakar, K., Channa, M. I., & Ahmed, A. (2014). A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science, 9, 280–296.

    Article  MathSciNet  Google Scholar 

  2. Apirajitha, P. S., Gopala Krishnan, C., Aravind Swaminathan, G., & Manohar, E. (2019). Enhanced secure user data on cloud using cloud data centre computing and decoy technique. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(9), 2278–3075. https://doi.org/10.35940/ijitee.I7777.078919

    Article  Google Scholar 

  3. Elwin, M. L., Freeman, R. A., & Lynch, K. M. (2017). Distributed Voronoi neighbor identification from inter-robot distances. IEEE Robotics and Automation Letters, 2(3), 1320–1327.

    Article  Google Scholar 

  4. Gomathi, S., & Gopala Krishnan, C. (2020). Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol. Wireless Personal Communications. https://doi.org/10.1007/s11277-020-07291-5

    Article  Google Scholar 

  5. Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.

    Article  Google Scholar 

  6. He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638–4646. https://doi.org/10.1109/TWC.2013.090413.130072

    Article  Google Scholar 

  7. He, D., Chen, C., Chan, S., & Bu, J. (2012). DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 11(5), 1946–1956. https://doi.org/10.1109/TWC.2012.030812.111857

    Article  Google Scholar 

  8. Janani, V. S., & Manikandan, M. S. K. (2018). Efficient trust management with Bayesian- Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. Journal of Wireless Communications and Networking, 25, 1–272.

    Google Scholar 

  9. Krishnan, C. G., Julie, E. G., & Robinson, Y. H. (2020). Predictive algorithm and criteria to perform big data analytics. In V. Balas, V. Solanki, & R. Kumar (Eds.), Internet of things and big data applications. Intelligent systems reference library. (Vol. 180). Springer. https://doi.org/10.1007/978-3-030-39119-5_16

    Chapter  Google Scholar 

  10. Krishnan, C., Rengarajan, A., & Manikandan, R. (2015). Delay reduction by providing location based services using hybrid cache in peer to peer networks. KSII Transactions on Internet and Information Systems, 9(6), 2078–2094. https://doi.org/10.3837/tiis.2015.06.006

    Article  Google Scholar 

  11. Krishnan, C. G., Robinson, Y. H., & Chilamkurti, N. (2020). Machine learning techniques for speech recognition using the magnitude. Journal of Multimedia Information System, 7(1), 33–40. https://doi.org/10.33851/JMIS.2020.7.1.33

    Article  Google Scholar 

  12. Krishnan, C. G., Sivakumar, K., & Manohar, E. (2018). An enhanced method to secure and energy effective data transfer in WSN using hierarchical and dynamic elliptic curve cryptosystem. In 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1-7). IEEE. DOI: https://doi.org/10.1109/ICSSIT.2018.8748785.

  13. Nagaraju, A., Kumar, G. C., & Ramachandram, S. (2011). Ad-hoc on demand distance vector routing algorithm using neighbor matrix method in static Ad-hoc networks. In N. Meghanathan, B. K. Kaushik, & D. Nagamalai (Eds.), Advances in networks and communications. CCSIT 2011. Communications in computer and information science. (Vol. 132). Springer.

    Google Scholar 

  14. O. Pandithurai, M. Poongodi, S. P. Kumar and C. G. Krishnan. A method to support multi-tenant as a service. 2011 Third International Conference on Advanced Computing, Chennai, 2011, pp. 157–162, DOI: https://doi.org/10.1109/ICoAC.2011.6165166.

  15. Priya, S., & Kannan, N. (2017). Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET. Wireless Networks, 23, 2227–2237. https://doi.org/10.1007/s11276-016-1284-1

    Article  Google Scholar 

  16. Rashvand, H. F., Abedi, A., Alcaraz-Calero, J. M., Mitchell, P. D., & Mukhopadhyay, S. C. (2014). wireless sensor systems for space and extreme environments: a review. IEEE Sensors Journal, 14(11), 3955–3970. https://doi.org/10.1109/JSEN.2014.2357030

    Article  Google Scholar 

  17. Shabut, A. M., Dahal, K. P., Bista, S. K., & Awan, I. U. (2015). Recommendation based trust model with an effective defence scheme for MANETs. IEEE Transactions on Mobile Computing, 14(10), 2101–2115.

    Article  Google Scholar 

  18. Sirisala, S., & Ramakrishna, S. (2019). Survey: Enhanced trust management for improving QoS in MANETs. In R. Bapi, K. Rao, & M. Prasad (Eds.), First international conference on artificial intelligence and cognitive computing. Advances in intelligent systems and computing. (Vol. 815). Springer.

    Google Scholar 

  19. Tong, F., Pan, J., & Zhang, R. (2017). Distance distributions in finite ad hoc networks: Approaches, applications, and directions. In Ad Hoc Networks (pp. 167–179). Springer, Cham.

  20. Velu S.G., Gopala Krishnan C., Sivakumar K., Jevin J.A. (2020) Proof of Shared Ownerships and Construct A Collaborative Cloud Application. In: Balaji S., Rocha Á., Chung YN. (eds) Intelligent Communication Technologies and Virtual Mobile Networks. ICICV 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 33. Springer, Cham.

  21. Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647–4658.

    Article  Google Scholar 

  22. Zhang, D., Gao, J., & Liu, X. (2019). Novel approach of distributed & adaptive trust metrics for MANET. Wireless Networks, 25, 3587–3603.

    Article  Google Scholar 

Download references

Funding

The author received no financial support for the research publication of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Gopala Krishnan.

Ethics declarations

Conflict of interest

The author have no conflict of interest and agree with the contents of the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gopala Krishnan, C., Gomathi, S., Aravind Swaminathan, G. et al. Trust Management Framework and High Energy Efficient Lifetime Management System for MANET using Self-Configurable Cluster Mechanism. Wireless Pers Commun 128, 2397–2417 (2023). https://doi.org/10.1007/s11277-022-10048-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10048-x

Keywords

Navigation