Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 9
Page No. 538 - 544

New Approach to Trust Evaluation for Cluster Based MANETS

Authors : Rajkumar Mylsamy and Subramanian Sankaranarayanan

References

Agarwal, R. and M. Motwani, 2009. Survey of clustering algorithms for MANET. Int. J. Comput. Sci. Eng., 1: 98-104.
Direct Link  |  

Babu, B.S. and P. Venkataram, 2011. A trust model for routing in MANETs: A cognitive agents based approach. Proceedings of the International Conference on Security and Management, July 18-21, 2011, Las Vegas, VA., USA., pp: 208-214.

Basagni, S., M. Conti, S. Giordano and I. Stojmenovic, 2004. Mobile Ad Hoc Networking. John Wiley and Sons Inc., New York, USA.

Bechler, M., H.J. Hof, D. Kraft, F. Pahlke and L. Wolf, 2004. A cluster-based security architecture for ad hoc networks. Proceedings of the 23rd IEEE Annual Joint Conference on Computer and Communications Societies, Volume 4, March 7-11, 2004, Hong Kong, China, pp: 2393-2403.

Chatterjee, M., S.K. Das and D. Turgut, 2002. WCA: A weighted clustering algorithm for mobile Ad Hoc networks. Cluster Comput., 5: 193-204.
CrossRef  |  Direct Link  |  

Chatterjee, P., 2009. Trust based clustering and secure routing scheme for mobile Ad Hoc networks. Int. J. Comput. Networks Commun., 1: 84-97.

Chen, J. and J. Wu, 2010. A survey on cryptography applied to secure mobile ad hoc networks and wireless sensor networks. pp: 1-34. http://www.cse.fau.edu/~jie/research/publications/Publication_files/wsn-chapter.pdf.

Chen, Y.S., Y.C. Tseng, J.P. Sheu and P.H. Kuo, 2004. An on-demand, link-state, multi-path QoS routing in a wireless mobile ad-hoc network. Comput. Commun., 27: 27-40.
CrossRef  |  Direct Link  |  

Dana, A., A.M. Yadegari, M. Hajhosseini and T. Mirfakhraie, 2008. A robust cross-layer design of clustering-based routing protocol for MANET. Proceedings of the 10th International Conference on Advanced Communication Technology, Volume 2, February 17-20, 2008, Gangwon-Do, Korea, pp: 1055-1059.

Ferdous, R., V. Muthukkumarasamy and E. Sithirasenan, 2011. Trust-based cluster head selection algorithm for mobile ad hoc networks. Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, November 16-18, 2011, Changsha, China, pp: 589-596.

Hu, Y.C., A. Perrig and D.B. Johnson, 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11: 21-38.
CrossRef  |  

Hwang, R.H., C.Y. Wang, C.J. Wu and G.N. Chen, 2013. A novel efficient power-saving MAC protocol for multi-hop MANETs. Int. J. Commun. Syst., 26: 34-55.
CrossRef  |  Direct Link  |  

Kadri, B., A. M'hamed and M. Feham, 2007. Secured clustering algorithm for mobile ad hoc networks. Int. J. Comput. Sci. Network Secur., 7: 27-34.
Direct Link  |  

Le, A., J. Loo, A. Lasebae, M. Aiash and Y. Luo, 2012. 6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach. Int. J. Commun. Syst., 25: 1189-1212.
CrossRef  |  Direct Link  |  

Li, X., M.R. Lyu and J. Liu, 2004. A trust model based routing protocol for secure ad hoc networks. Proceedings of the IEEE Conference on Aerospace, Volume 2, March 6-13, 2004, Big Sky, Montana, USA., pp: 1286-1295.

Liang, B. and Z.J. Haas, 2006. Hybrid routing in ad hoc networks with a dynamic virtual backbone. IEEE Trans. Wireless Commun., 5: 1392-1405.
CrossRef  |  

Liang, Z. and W. Shi, 2008. Analysis of ratings on trust inference in open environments. Perform. Eval., 65: 99-128.
CrossRef  |  Direct Link  |  

Liu, K., J. Deng, P.K. Varshney and K. Balakrishnan, 2007. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput., 6: 536-550.
CrossRef  |  

Park, C.I., Y.H. Lee, H. Yoon, D.S. Choi and S.H. Jin, 2005. Cluster-based trust evaluation in ad hoc networks. Proceedings of the 7th International Conference on Advanced Communication Technology, February 21-23, 2005, Dublin, Ireland, pp: 503-507.

Peiravi, A., H.R. Mashhadi and S.H. Javadi, 2013. An optimal energy‐efficient clustering method in wireless sensor networks using multi‐objective genetic algorithm. Int. J. Commun. Syst., 26: 114-126.
CrossRef  |  Direct Link  |  

Perkins, C. and E. Royer, 1999. Ad hoc on-demand distance vector routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 25-26, 1999, New Orleans, LA., USA., pp: 90-100.

Perkins, C.E., 2001. Ad Hoc Networking. Addison-Wesly, Boston, MA., USA.

Rani, V.G. and M. Punithavelli, 2010. Optimizing on demand weight-based clustering using trust model for mobile ad hoc networks. Int. J. Ad Hoc Sensor Ubiquitous Comput., 1: 81-91.
Direct Link  |  

Royer, E.M. and C.K. Toh, 1999. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Commun., 6: 46-55.
CrossRef  |  

Safa, H., H. Artail and D. Tabet, 2010. A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16: 969-984.
CrossRef  |  

Samar, P., M.R. Pearlman and Z.J. Haas, 2004. Independent zone routing: An adaptive hybrid routing framework for ad hoc wireless networks. IEEE/ACM Trans. Networking, 12: 595-608.
CrossRef  |  

Song, S., K. Hwang, R. Zhou and Y.K. Kwok, 2005. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput., 9: 24-34.
CrossRef  |  

Tseng, C.C. and K.C. Chen, 2007. Organizing an optimal cluster-based ad hoc network architecture by the modified Quine-McCluskey algorithm. IEEE Commun. Lett., 11: 43-45.
CrossRef  |  

Wang, Q., J. Wang, J. Yu, M. Yu and Y. Zhang, 2012. Trust‐aware query routing in P2P social networks. Int. J. Commun. Syst., 25: 1260-1280.
CrossRef  |  Direct Link  |  

Yang, W.D. and G.Z. Zhang, 2007. A weight-based clustering algorithm for mobile ad hoc network. Proceedings of the 3rd International Conference on Wireless and Mobile Communications, March 4-9, 2007, Guadeloupe, pp: 3-3.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved