Abstract
Mobile Adhoc Network (MANET) is a dynamic field that has acquired remarkable attention for its self-configuration and self-maintenance. It is composed of Mobile Nodes using radio links to form a network without any infrastructure. In MANETs, wireless nodes are allowed to move freely and can join/leave network. MANETs are extremely at risk to various misbehaviours due to reasons like absence of transmission infrastructures, dynamic network topologies, as well as short communicative range. For detecting as well as reducing misbehaviour, several trust management strategies were suggested for MANETs. MANETs trust migration is a level of belief according to nodes behaviour. This work investigated MANETs trust based clustering algorithm. A weighted clustering Trust model algorithm is proposed and impact of maliciousness and a cluster head selection algorithm is investigated. The simulations are conducted for without malicious nodes, 10 % malicious node and 20 % malicious node in the network with trust and without trust and for the proposed method. The packet delivery ratio improved by 16.18 % than 10 % malicious nodes with trust in the network compared with Trust model weighted clustering without malicious nodes for 40 nodes.
Similar content being viewed by others
References
Jain, S. (2014). Security threats in MANETS: A review. arXiv preprint arXiv:1405.5320.
Sharma, M., & Dubey, S. K. (2014). Analytical study of cluster based routing protocols in MANET.
Aarti, D. S. (2013). Tyagi, “Study Of Manet: Characteristics, challenges, application and security attacks”. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 252–257.
Roy, D. B., & Chaki, R., (2013). MCBHIDS: Modified layered cluster based algorithm for black hole IDS. In 2013 annual IEEE India conference (INDICON), (Vol 13–15, pp. 1–6).
Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E., (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), (Vol 16–18, pp. 589–596).
Gupta, N., Singh, R.K., & Shrivastava, M., (2013). Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks. In 2013 tenth international conference on wireless and optical communications networks (WOCN) (Vol. 26–28, pp. 1–5).
Singhal, S. & Daniel, A. K., (2014). Fuzzy logic based clusterhead selection protocol under Competence level, Goodness function and Mobility for mobile ad hoc network. In 2014 Conference on IT in business, industry and government (CSIBIG) (Vol. 8–9, pp. 1–6).
Safdar, G. A. & McLoone, M., (2007). Randomly shifted certification authority authentication protocol for MANETs. In Mobile and wireless communications summit, 2007. 16th IST, (Vol 1–5, pp. 1–5).
Rachedi, A., & Benslimane, A., (2006). Trust and mobility-based clustering algorithm for secure mobile ad hoc networks. In ICSNC ‘06 International conference on systems and networks communications, 2006 (pp. 72–720).
Pari, S. N., Narmadhadevi, B. & Duraisamy, S., (2012). Requisite trust-based secure routing protocol for MANETs. In 2012 International conference on recent trends in information technology (ICRTIT), (Vol 19–21, pp. 276–281).
Jenitha, T., & Jayashree, P., (2014). Distributed trust node selection for secure group communication in MANET. In 2014 Fourth international conference on advances in computing and communications (ICACC), (Vol 27–29, pp. 179–182).
Morii, K., Taketa, K., Mori, Y., Kojima, H., Kohno, E., Inoue, S., Ohta, T., & Kakuda, Y., (2012). A new generation children tracking system using bluetooth MANET composed of android mobile terminals. In Ubiquitous intelligence & computing and 9th international conference on autonomic & trusted computing (UIC/ATC), 2012, (Vol 4–7, pp. 405–407).
Malek, S. F., & Khorsandi, S., (2013). A cooperative intrusion detection algorithm based on trusted voting for mobile ad hoc network. In 2013 21st Iranian conference on electrical engineering (ICEE), (Vol 14–16, pp. 1–8).
Karygiannis, A., Antonakakis, E.& Apostolopoulos, A., (2006). Detecting critical nodes for MANET intrusion detection systems. In Second international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2006. SecPerU 2006, (Vol 29–29, pp. 9–15).
Vilhan, P., & Hudec, L., (2014). Cluster glue–improving service reachability in PKI enabled MANET. In 2014 UKSim-AMSS 16th international conference on computer modelling and simulation (UKSim), (Vol 26–28, pp. 494–499).
Annadurai, P., & Vijayalaksmi, S., (2014). Identifying malicious node using trust value in cluster based MANET (IMTVCM). In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT), (Vol 10–11, pp. 1150–1158).
Chatterjee, M., Das, S. K., & Turgut, D. (2000). An on-demand weighted clustering algorithm (WCA) for ad hoc networks. In Global telecommunications conference, 2000. GLOBECOM’00, (Vol. 3, pp. 1697–1701).
Mylsamy, R. & Subranarayanan, S. (2014). A new approach to trust evaluation for cluster based MANETS. Journal of Theoretical and Applied Information Technology, 64(3), 837–844.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ashwin, M., Kamalraj, S. & Azath, M. Weighted Clustering Trust Model for Mobile Ad Hoc Networks. Wireless Pers Commun 94, 2203–2212 (2017). https://doi.org/10.1007/s11277-016-3371-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3371-0