Abstract
Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for trust and head selection (2PTH) algorithm is proposed for communication privacy from intermediate malicious nodes. A 2PTH algorithm is a combination of preference-based trust selection algorithm (PTA) and preference-based head election algorithm (PHA). To discover routes with trusted nodes, PTA is proposed for determining a route without malevolent nodes for forwarding packets based on Weight assignment to trust parameters. The work also proposes a PHA, based on internal and external factors of a node, aiming at finding quick response during the routing process. Simulations are performed using NS2 simulator. We compare the proposed 2PTH algorithm with other clustering algorithms, which are cluster-based trust-aware routing protocol, 2ACK model and low energy adaptive clustering hierarchy. Our analysis and simulation results show that, the proposed 2PTH algorithm efficiently detects and isolates malicious nodes, and it outperforms the other algorithms.






Similar content being viewed by others
References
Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2004). Mobile ad hoc networking. London: IEEE Press and Wiley.
Dana, A., Yadegari, A. M., Hajhosseini, M., & Mirfakhraie, T. (2008). A robust cross-layer design of clustering-based routing protocol for MANET. In Proceedings of international conference on advanced communication technology (ICACT) (pp. 1055–1059).
Hwang, R. H., Wang, C. Y., Wu, C. J., & Chen, G. N. (2013). A novel efficient power-saving MAC protocol for multi-hop MANETs. International Journal of Communication Systems, 26(1), 34–55.
Perkins, C. E. (2001). Ad hoc networking. Reading, MA: Addison-Wesley.
Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.
Chen, Y. S., Tseng, Y. C., Sheu, J. P., & Kuo, P. H. (2004). An on-demand, linkstate, multi-path QoS routing in a wireless mobile ad-hoc network. Computer Communication, 27(1), 27–40.
Perkins, C., Royer, E. & Das, S. (1999). Ad hoc on-demand distance vector (AODV). In Proceedings of second IEEE workshop on mobile computing systems and applications (pp. 90–100).
Liang, B., & Haas, Z. J. (2006). Hybrid routing in ad hoc networks with a dynamic virtual backbone. IEEE Transactions on Wireless Communications, 5(6), 1392–1405.
Samar, P., Pearlman, M. R., & Haas, Z. J. (2004). Independent zone routing: An adaptive hybrid routing framework for ad hoc wireless networks. ACM Transactions on Networking, 12(4), 595–608.
Tseng, C. C., & Chen, K. C. (2007). Organizing an optimal cluster-based ad hoc network architecture by the modified Quine–McCluskey algorithm. IEEE Communication, 11(1), 43–45.
Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing Journal, 5(2), 193–204.
Peiravi, A., Mashhadi, H. R., & Hamed, J. (2012). An optimal energy-efficient clustering method in wireless sensor networks using multi-objective genetic algorithm. International Journal of Communication Systems, 26(1), 114–126.
Agarwal, R., & Motwani, M. (2009). Survey of clustering algorithms for MANET. International Journal on Computer Science and Engineering, 1, 98–104.
Bechler, M., Hof, H. J., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of twenty-third annual joint conference of the IEEE computer and communications societies (pp. 2393–2403).
Park, C., Lee, Y. H., Yoon, H., Choi, D. S., & Jin, S. H. (2005). Cluster based trust evaluation in ad hoc networks. In Proceedings of international conference on advanced communication technology (pp. 503–507).
Yang, W. D., & Zhang, G. Z. (2007). A weight-based clustering algorithm for mobile ad hoc network. In Proceedings of international conference on wireless and mobile communications (ICWMC‘07).
Mangai, S., & Tamilarasi, A. (2011). A new approach to geographic routing for location aided cluster based MANETs. Eurasip Journal of Wireless Communications, 18, 1–10.
Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969–984.
Su, Y., Hwang, S., & Dow, C. (2008). An efficient cluster-based routing algorithm in ad hoc networks with unidirectional links. Journal of Information Science Engineering, 24(5), 1409–1428.
Handy, M. J., Haas, M., & Timmermann, D. (2002). Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In Proceedings of international workshop on mobile and wireless communications network (pp. 368–372).
Hu, Y. C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.
Li, X., Lyu, M. R., & Liu, J. (2004). A trust model based routing protocol for secure ad hoc networks. In Proceedings of IEEE aerospace conference (pp. 1286–1295).
Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.
Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication System, 25(9), 1189–1212.
Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in open environments. Perform Evaluation, 65(2), 99–128.
Chatterjee, P. (2009). Trust based clustering and secure routing scheme for mobile ad hoc networks. International Journal of Computer Networks and Communication, 1(2), 84–97.
Wang, Q., Wang, J., Yu, J., & Zhang, Y. (2012). Trust-aware query routing in P2P social networks. International Journal of Communication System, 25(10), 1260–1280.
Rani, V. G., & Punithavelli, M. (2010). Optimizing on demand weight-based clustering using trust model for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 1(4), 81–91.
Chen, J., & Wu, J. (2010). A survey on cryptography applied to secure mobile ad hoc networks and wireless sensor networks. In H. Jin & W. Jiang (Eds.), Handbook of research on developments and trends in wireless sensor networks: from principle to practice. IGI Global.
Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Proceedings of international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 589–596).
Kadri, B., Mohamed, A., & Feham, M. (2007). Secured clustering algorithm for mobile ad hoc networks. IJCSNS, 7(3), 27–34.
SathishBabu, B. B., & Venkataram, P. (2011). A trust model for routing in MANETs: A cognitive agents based approach. In Proceedings of international conference on security and management (pp. 208–214).
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mylsamy, R., Sankaranarayanan, S. A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET. Wireless Pers Commun 86, 1611–1627 (2016). https://doi.org/10.1007/s11277-015-3010-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-3010-1