Skip to main content
Log in

A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for trust and head selection (2PTH) algorithm is proposed for communication privacy from intermediate malicious nodes. A 2PTH algorithm is a combination of preference-based trust selection algorithm (PTA) and preference-based head election algorithm (PHA). To discover routes with trusted nodes, PTA is proposed for determining a route without malevolent nodes for forwarding packets based on Weight assignment to trust parameters. The work also proposes a PHA, based on internal and external factors of a node, aiming at finding quick response during the routing process. Simulations are performed using NS2 simulator. We compare the proposed 2PTH algorithm with other clustering algorithms, which are cluster-based trust-aware routing protocol, 2ACK model and low energy adaptive clustering hierarchy. Our analysis and simulation results show that, the proposed 2PTH algorithm efficiently detects and isolates malicious nodes, and it outperforms the other algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2004). Mobile ad hoc networking. London: IEEE Press and Wiley.

    Book  Google Scholar 

  2. Dana, A., Yadegari, A. M., Hajhosseini, M., & Mirfakhraie, T. (2008). A robust cross-layer design of clustering-based routing protocol for MANET. In Proceedings of international conference on advanced communication technology (ICACT) (pp. 1055–1059).

  3. Hwang, R. H., Wang, C. Y., Wu, C. J., & Chen, G. N. (2013). A novel efficient power-saving MAC protocol for multi-hop MANETs. International Journal of Communication Systems, 26(1), 34–55.

    Article  Google Scholar 

  4. Perkins, C. E. (2001). Ad hoc networking. Reading, MA: Addison-Wesley.

    Google Scholar 

  5. Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.

    Article  Google Scholar 

  6. Chen, Y. S., Tseng, Y. C., Sheu, J. P., & Kuo, P. H. (2004). An on-demand, linkstate, multi-path QoS routing in a wireless mobile ad-hoc network. Computer Communication, 27(1), 27–40.

    Article  Google Scholar 

  7. Perkins, C., Royer, E. & Das, S. (1999). Ad hoc on-demand distance vector (AODV). In Proceedings of second IEEE workshop on mobile computing systems and applications (pp. 90–100).

  8. Liang, B., & Haas, Z. J. (2006). Hybrid routing in ad hoc networks with a dynamic virtual backbone. IEEE Transactions on Wireless Communications, 5(6), 1392–1405.

    Article  Google Scholar 

  9. Samar, P., Pearlman, M. R., & Haas, Z. J. (2004). Independent zone routing: An adaptive hybrid routing framework for ad hoc wireless networks. ACM Transactions on Networking, 12(4), 595–608.

    Article  Google Scholar 

  10. Tseng, C. C., & Chen, K. C. (2007). Organizing an optimal cluster-based ad hoc network architecture by the modified Quine–McCluskey algorithm. IEEE Communication, 11(1), 43–45.

    Article  Google Scholar 

  11. Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing Journal, 5(2), 193–204.

    Article  Google Scholar 

  12. Peiravi, A., Mashhadi, H. R., & Hamed, J. (2012). An optimal energy-efficient clustering method in wireless sensor networks using multi-objective genetic algorithm. International Journal of Communication Systems, 26(1), 114–126.

    Article  Google Scholar 

  13. Agarwal, R., & Motwani, M. (2009). Survey of clustering algorithms for MANET. International Journal on Computer Science and Engineering, 1, 98–104.

    Google Scholar 

  14. Bechler, M., Hof, H. J., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of twenty-third annual joint conference of the IEEE computer and communications societies (pp. 2393–2403).

  15. Park, C., Lee, Y. H., Yoon, H., Choi, D. S., & Jin, S. H. (2005). Cluster based trust evaluation in ad hoc networks. In Proceedings of international conference on advanced communication technology (pp. 503–507).

  16. Yang, W. D., & Zhang, G. Z. (2007). A weight-based clustering algorithm for mobile ad hoc network. In Proceedings of international conference on wireless and mobile communications (ICWMC‘07).

  17. Mangai, S., & Tamilarasi, A. (2011). A new approach to geographic routing for location aided cluster based MANETs. Eurasip Journal of Wireless Communications, 18, 1–10.

    Article  Google Scholar 

  18. Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969–984.

    Article  Google Scholar 

  19. Su, Y., Hwang, S., & Dow, C. (2008). An efficient cluster-based routing algorithm in ad hoc networks with unidirectional links. Journal of Information Science Engineering, 24(5), 1409–1428.

    Google Scholar 

  20. Handy, M. J., Haas, M., & Timmermann, D. (2002). Low energy adaptive clustering hierarchy with deterministic cluster-head selection. In Proceedings of international workshop on mobile and wireless communications network (pp. 368–372).

  21. Hu, Y. C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.

    Article  Google Scholar 

  22. Li, X., Lyu, M. R., & Liu, J. (2004). A trust model based routing protocol for secure ad hoc networks. In Proceedings of IEEE aerospace conference (pp. 1286–1295).

  23. Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.

    Article  Google Scholar 

  24. Le, A., Loo, J., Lasebae, A., Aiash, M., & Luo, Y. (2012). 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication System, 25(9), 1189–1212.

    Article  Google Scholar 

  25. Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in open environments. Perform Evaluation, 65(2), 99–128.

    Article  Google Scholar 

  26. Chatterjee, P. (2009). Trust based clustering and secure routing scheme for mobile ad hoc networks. International Journal of Computer Networks and Communication, 1(2), 84–97.

    Google Scholar 

  27. Wang, Q., Wang, J., Yu, J., & Zhang, Y. (2012). Trust-aware query routing in P2P social networks. International Journal of Communication System, 25(10), 1260–1280.

    Article  MathSciNet  Google Scholar 

  28. Rani, V. G., & Punithavelli, M. (2010). Optimizing on demand weight-based clustering using trust model for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 1(4), 81–91.

    Article  Google Scholar 

  29. Chen, J., & Wu, J. (2010). A survey on cryptography applied to secure mobile ad hoc networks and wireless sensor networks. In H. Jin & W. Jiang (Eds.), Handbook of research on developments and trends in wireless sensor networks: from principle to practice. IGI Global.

  30. Ferdous, R., Muthukkumarasamy, V., & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Proceedings of international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 589–596).

  31. Kadri, B., Mohamed, A., & Feham, M. (2007). Secured clustering algorithm for mobile ad hoc networks. IJCSNS, 7(3), 27–34.

    Google Scholar 

  32. SathishBabu, B. B., & Venkataram, P. (2011). A trust model for routing in MANETs: A cognitive agents based approach. In Proceedings of international conference on security and management (pp. 208–214).

  33. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajkumar Mylsamy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mylsamy, R., Sankaranarayanan, S. A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET. Wireless Pers Commun 86, 1611–1627 (2016). https://doi.org/10.1007/s11277-015-3010-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3010-1

Keywords

Navigation