Location Aware Clustering and Trust Management in Mobile Ad Hoc Networks

被引:0
|
作者
Chatzidakis, Michail [1 ]
Hadjiefthymiades, Stathes [1 ]
机构
[1] Univ Athens, Dept Informat & Telecommun, Athens, Greece
关键词
Trust Models; Security Models; Protocol Design; Network Security; Intrusion Detection;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Properly clustering a Mobile Ad Hoc Network (MANET) is an efficient method to ensure optimal network resources exploitation. A lot of clustering schemes have been proposed, most of them suffering from the same drawback i.e., cluster lifetime instability due to the mobility of the nodes. In order to cope with this particular problem, along with trust issues that arise and have been partially investigated previously, we propose a time-optimized clustering scheme which improves the lifespan of the network clusters, thus leading to increased trust efficiency, since malicious nodes are easier to locate. The malicious node spotting is achieved by combining individual node observations, as well as the collective cluster trust estimation regarding the reputation vector of a specific node.
引用
收藏
页码:55 / 60
页数:6
相关论文
共 50 条
  • [31] Efficient group communications in location aware mobile ad-hoc networks
    Mitra, Pramita
    Poellabauer, Christian
    PERVASIVE AND MOBILE COMPUTING, 2012, 8 (02) : 229 - 248
  • [32] QoS-aware service location in mobile ad-hoc networks
    Liu, JS
    Issarny, V
    2004 IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2004, : 224 - 235
  • [33] Mobile Agent Based Protocol for Location Management in Mobile Ad Hoc Networks
    Mallikarjun, B. C.
    Kapinaiah, Viswanath
    2021 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2021, : 406 - 410
  • [34] Distributed Management System for Trust and Reward in Mobile Ad hoc Networks
    Goka, Sonoko
    Shigeno, Hiroshi
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [35] Multiobjective Secure Trust Aware Redundant Array Shifting Encryption and Clustering Based Routing in Mobile Ad Hoc Networks
    Prasanna, K. S.
    Ramesh, B.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2025, 38 (05)
  • [36] Recent Survey onEfficient Trust Management in Mobile Ad hoc Networks
    Anugraha, M.
    Krishnaveni, S. H.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [37] Critical Issues in Trust Management for Mobile Ad-Hoc Networks
    Shankaran, Rajan
    Varadharajan, Vijay
    Orgun, Mehmet A.
    Hitchens, Michael
    PROCEEDINGS OF THE 2009 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2008, : 97 - 100
  • [38] Trust Establishment in Mobile Ad Hoc Networks
    Kartha, Geethu Krishna
    Neeba, E. A.
    2014 3RD INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS 2014), 2014, : 133 - 137
  • [39] On Trust Evaluation in Mobile Ad Hoc Networks
    Dang Quan Nguyen
    Lamont, Louise
    Mason, Peter C.
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 1 - 13
  • [40] A guide to trust in mobile ad hoc networks
    Balfe, Shane
    Yau, Po-Wah
    Paterson, Kenneth G.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 503 - 516